US20020056046A1 - Method for automatically initiating a computer security and/or screen saver mode - Google Patents
Method for automatically initiating a computer security and/or screen saver mode Download PDFInfo
- Publication number
- US20020056046A1 US20020056046A1 US09/037,360 US3736098A US2002056046A1 US 20020056046 A1 US20020056046 A1 US 20020056046A1 US 3736098 A US3736098 A US 3736098A US 2002056046 A1 US2002056046 A1 US 2002056046A1
- Authority
- US
- United States
- Prior art keywords
- computer
- proximate
- person
- screen saver
- detecting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3206—Monitoring of events, devices or parameters that trigger a change in power modality
- G06F1/3215—Monitoring of peripheral devices
- G06F1/3218—Monitoring of peripheral devices of display devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3206—Monitoring of events, devices or parameters that trigger a change in power modality
- G06F1/3231—Monitoring the presence, absence or movement of users
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Definitions
- These inventions relates to a method of operating computers, and more particularly, to a method for causing a computer to automatically switch to a screen saver and/or secure operating mode when a computer user leaves the computer.
- Computers and, more particularly, personal computers, are in widespread use in the home and workplace. Such computers are commonly used to record or process information that the user of the computer desires to maintain confidential. Confidential information present in a computer is typically maintained confidential by placing the computer in a password protected “screen saver” mode. Once the computer has transitioned from a normal operating mode to the password protected screen saver mode, information recorded in the computer can be accessed only after the correct password has been entered by typing the password on a keyboard of the computer. If only authorized users of the computer know the password, the confidential information will be accessible only to authorized users.
- Computers typically automatically switch from the normal operating mode to the password protected screen saver mode after a predetermined period has elapsed since an input device for the computer was last manipulated. Thus, if a user stops using the computer for the predetermined period, the computer automatically switches to the password protected screen saver mode. Generally, the user sets the predetermined period that must lapse before the computer transitions to the screen saver mode. The user may also generally switch the computer to the password protected screen saver mode by pressing a predetermined combination of keys on the keyboard.
- confidential information can normally be adequately safeguarded only by selecting a very short delay period, i.e., on the order of a few minutes.
- the computer user can manually switch the computer to the password protected screen saver mode by pressing the predetermined combination of keys on the keyboard.
- the other alternative i.e., relying on the user to type the predetermined combination of keys to switch the computer to the password protected screen saver mode, may fail to adequately protect confidential information.
- the computer user may forget to switch the computer to the screen saver mode.
- the computer user may also choose not to switch the computer to the screen saver mode because he or she expects to be absent from the computer for only a brief period of time.
- the computer user may greatly underestimate the amount of time that he or she will be absent from the computer. In either case, the computer is left unattended in the normal operating mode, thereby making the confidential information readily accessible to unauthorized individuals.
- a screen saver method controls the operating mode of a computer to automatically switch the computer to a screen saver mode when a computer user leaves the proximity of the computer.
- the screen saver mode is preferably one that requires the user to enter a password before the computer will function in a normal manner.
- the method includes detecting whether a person is located proximate the computer, and causing the computer to execute a screen saver program responsive to detecting that the person is not located proximate the computer.
- the act of detecting whether a person is located proximate the computer may include detecting whether there is movement of an object proximate the computer, or detecting whether light, sound, or electromagnetic energy broadcast adjacent the computer is reflected from a person proximate the computer.
- the act of detecting whether a person is located proximate the computer may also include detecting the weight of the person at a predetermined location proximate the computer.
- FIG. 1 is an isometric view of a computer that may be operated according to various embodiments of the inventive method in which the computer is positioned on a desk proximate a workspace that may be occupied by an individual.
- FIG. 2 is a block diagram of an electronic system that operates in accordance with one embodiment of the inventive method by interfacing a computer with a proximity sensor through a PCI-ISA bus bridge.
- FIG. 3 is a block diagram of an electronic system that operates in accordance with another embodiment of the inventive method by interfacing a computer with a proximity sensor through a keyboard interface microcontroller.
- FIG. 4 is a block diagram of an electronic system that operates in accordance with still another embodiment of the inventive method by interfacing a computer with a proximity sensor through a keyboard.
- FIG. 5 is a block diagram of the keyboard of FIG. 4 showing the manner in which the proximity sensor interfaces with the keyboard.
- FIG. 6 is a block diagram of one embodiment of a proximity sensor that may be used in the embodiments of FIGS. 2 - 5 .
- FIG. 1 A computer 10 that operates according to one embodiment of the inventive method is shown in FIG. 1.
- the computer 10 is placed on the top of a desk D in front of a workspace W positioned behind the desk D that is sometimes occupied by a computer user.
- the workspace W may also include a floor pad P adapted to support a chair on which the computer user may sit while occupying the workspace W to work on the computer 10 .
- the computer 10 includes a computer chassis 12 of convention design, a convention cathode ray tube (“CRT”) monitor 14 having a CRT screen 16 , and a conventional keyboard 18 , all of which are placed on the desk D.
- the keyboard 18 also contains a proximity sensor 20 that detects whether or not the computer user is present at the workspace W proximate the computer 10 .
- the proximity sensor could alternatively be mounted in the chassis 12 , monitor 14 , or any other location that is proximate an user operating the computer 10 .
- the computer 10 could have different components, such as a mouse or other pointing device (not shown) or a unitary chassis, keyboard, and display as in a laptop computer (not shown).
- the computer 10 operates in accordance with an operating system, such as a windows-based operating system like Microsoft Windows® operating system.
- an operating system such as a windows-based operating system like Microsoft Windows® operating system.
- applications programs such as a word processor, spreadsheet, database, etc.
- the operating system will generally include a “screen saver” program, although a separate “screen saver” application program may also be loaded on the computer 10 .
- the “screen saver” program causes a stationary or moving image to be displayed on the screen 16 of the monitor 14 in place of an image that would otherwise be displayed by the operating system or currently executing application program.
- the “screen saver” normally starts running automatically after a user selectable period of time has elapsed since an input device, e.g., the keyboard 18 , was manipulated by the computer user. However, the user may manually cause the computer 10 to start executing the screen saver program by pressing a predetermined combination of keys on the keyboard 18 , such as control, shift, and function “F” keys.
- the screen saver program can generally operate in either of two modes, namely an unprotected mode or a password protected mode.
- the unprotected mode the computer 10 stops executing the screen saver program whenever the computer user manipulates an input device, such as the keyboard 18 .
- the computer 10 then resumes executing whatever program it was executing when the computer 10 started executing the screen saver program.
- the password-protected mode the screen saver does not stop executing the screen saver program unless the computer user correctly types in a secret password. If the user types the correct password, the computer 10 will discontinue executing the screen saver program and resume executing whatever program it was executing when the computer 10 started executing the screen saver program.
- the computer 10 will not execute any application program regardless of what keys are pressed or other action is taken by the user.
- the various embodiments of the invention may be used with a screen saver program operating in either the unprotected mode or the password protected mode, it is most valuable when the screen saver program is operating in the password protected mode.
- the computer 10 shown in FIG. 1 is operated in a manner that avoids the above-described problems by using the proximity sensor 20 to determine whether or not the individual is present at the workspace W proximate the computer 10 . If the individual is present at the workspace W, the computer 10 continues to execute the operating system or application program without executing the screen saver program. When the individual leaves the workspace W, the proximity sensor 20 detects the absence of the individual from the workspace W and causes the computer 10 to execute the screen saver, either immediately or after a predetermined delay. Alternatively, the computer 10 may begin executing the screen saver before the user leaves the workspace W, but it does not operate in a password protected mode until the proximity sensor 20 detects that the user has left the workspace W.
- the proximity sensors 20 may be any of a variety of conventional or subsequently developed proximity sensors.
- the proximity sensor 20 may broadcast sound (ultrasound or at another frequency), light (infrared or at another wavelength), electromagnetic energy, etc., and detect whether or not the sound, light, electromagnetic energy, etc. is reflected from an individual present at the workspace W.
- the proximity sensor 20 may detect the presence of the individual at the workspace W either directly or by detecting movement of the individual at the workspace W.
- Proximity sensors 20 other than reflective proximity sensors mounted on or near the keyboard 18 or other component of the computer 10 may also be used.
- a weight sensor S placed under the floor pad P may be used to detect the presence of the individual sitting in a chair on the floor pad P.
- the term “proximity sensor” is intended to encompass any device that determines whether or not the individual proximate the computer 10 .
- FIG. 2 One embodiment of an electronic password protected screen saver system 30 that may operate in according to one embodiment of the invention is illustrated in FIG. 2.
- the system 30 includes than a conventional computer system 32 including a CPU 34 coupled to a system controller 36 through a CPU bus 38 .
- the system controller 36 includes a DRAM controller 40 that couples the CPU 34 to a dynamic random access memory (“DRAM”) 44 through a control bus 46 , an address plus 48 , and a data bus 50 .
- the system controller 36 also couples the CPU 34 to a peripheral component interconnect (“PCI”) bus 56 .
- the PCI bus 56 may be coupled to a variety of input output (“I/O”) devices as well as to a PCI-bus bridge 60 .
- the PCI bus 56 is also coupled to video graphics accelerator (“VGA”) controller 64 that interfaces with both a frame buffer memory 66 and a cathode ray tube (“CRT”) monitor 68 .
- VGA video graphics accelerator
- CRT cathode ray tube
- the PCI bus 56 is a relatively high speed bus, and, in conjunction with the VGA controller 64 , allows the CRT monitor 68 to display video graphics at a relatively high rate.
- the frame buffer memory 66 stores most of the video data displayed on the CRT monitors 68 so that the PCI bus 56 needs to provide video data to the VGA controller 64 only when corresponding pixels of the video images change.
- the VGA controller 64 and the frame buffer memory 66 minimize the burden on the PCI bus 56 .
- the PCI bus 56 is coupled to a PCI-ISA bus bridge 60 , which couples the PCI bus 56 to an industry standard architecture (“ISA”) bus 70 .
- ISA industry standard architecture
- the ISA bus 70 is relatively slow compared to the PCI bus 56 .
- the ISA bus 64 is also connected to various I/O devices such as a flash read-only memory (“ROM”) basic input/output system (“BIOS”) memory 74 and a conventional controller 78 that interfaces with a keyboard 80 and a mouse pointing device 82 .
- ROM read-only memory
- BIOS basic input/output system
- the PCI-ISA bus bridge 60 also includes an integrated device electronics (“IDE”) controller 90 that is coupled to a fixed disk drive 92 for the mass storage of data.
- IDE integrated device electronics
- the operating system stored on the hard disk drive 92 may include screen saver software.
- the screen saver software causes a screen saver image to be displayed on the CRT monitor 68 , typically after the computer system 32 has been idle for more than a pre-determined period.
- screen savers operating in a conventional computer system 32 of the type shown in FIG. 2 exhibit the problems described above. Specifically, computer system 32 may fail to switch to the screen saver mode soon enough after the operator leaves the proximity of the computer system 32 . Also, the computer system 32 may repeatedly switch to the screen saver mode throughout the day even though the operator remains in the proximity of the computer system 32 . The operator is thus required to repeatedly enter a screen saver password to use the computer throughout the day.
- the embodiment of the system 30 shown in FIG. 2 avoids these problems by using a proximity sensor 100 that is coupled to a general purpose input port (“GPIO”) conventionally included in the PCI-ISA bus bridge 60 .
- the CPU 34 is programmed to periodically poll the proximity sensor 100 through the PCI-ISA bus bridge 60 .
- the proximity sensor 100 may be polled as frequently as each second or faster using a time base provided by a system clock (not shown) included in the computer system 32 .
- They operating system stored on the hard disk drive 92 is programmed to forego initiating the screen saver mode unless polling of the proximity sensor 100 indicates that an operator is no longer present in the proximity of the computer system 32 . If the operator leaves the proximity of the computer system 32 , the proximity sensor 100 detects his or her absence.
- the CPU 34 When the CPU 34 subsequently polls the proximity sensor 100 , the CPU 34 switches the computer system 32 to the screen saver mode either immediately or after a pre-determined time. In the later case, if the operator returns to the proximity of the computer system 32 during this pre-determined period, the computer system 32 is inhibited from switching to the screen saver mode.
- FIG. 3 An alternative the embodiment of a system 120 for automatically initiating a screen saver mode is illustrated in FIG. 3.
- the system 120 includes a conventional computer system 122 containing many of the same components that are in the computer system 32 of FIG. 2. Therefore, in the interest of brevity, these components have been provided with the same reference numerals, and an explanation of their structure and operation will not been repeated.
- the proximity sensor 100 is coupled to the keyboard interface microcontroller 78 through a general-purpose input port conventionally included in the microcontroller 78 .
- the proximity sensor 100 is polled as frequently as each second or faster using a time base conventionally provided in the keyboard controller 78 .
- the proximity sensor 100 may be polled as the controller repeatedly executes an internal software loop.
- the keyboard controller 78 detects a signal from the proximity sensor 100 indicating the presence of an operator in the proximity of the computer system 122
- the keyboard controller 78 initiates a code sequence that simulates activation of a key on the keyboard 80 .
- the code sequence may simulate a null key press (e.g., a “shift key”).
- Activation of a null key does not generally perform any function in an applications program being executed in the computer system 122 .
- screen saver programs are typically programmed to inhibit switching to a screen saver mode for a pre-determined time after any keystroke.
- the keyboard controller 78 initiates a code sequence simulating a key press
- the computer system 122 is inhibited from entering the screen saver mode.
- the parameters of the screen saver program can be set to provide a very short delay time to enter the screen saver mode after the computer system 122 has become idle.
- FIG. 4 Still another embodiment of a system 140 for automatically initiating a screen saver mode is illustrated in FIG. 4.
- the system 140 also includes a conventional computer system 142 containing many of the same components that are in the computer system 32 of FIG. 2, which have been provided with the same reference numerals.
- the proximity sensor 100 is coupled directly to a specially configured keyboard 148 .
- the keyboard interface microcontroller 78 polls the keyboard 148 through the general-purpose input port in the microcontroller 78 .
- the proximity sensor 100 is polled as frequently as each second or faster each time the software controlling the operation of the keyboard interface microcontroller 78 passes through its normal keyboard scan routine.
- One advantage of the system 140 of FIG. 4 is that it can be implemented simply by replacing the keyboard 80 in a conventional computer system with the keyboard 148 .
- the proximity sensor 100 When the proximity sensor 100 provides a signal indicating the presence of an operator in the proximity of the computer system 142 , the signal causes the keyboard 148 to simulate activation of a key on the keyboard 148 .
- a null key press may be simulated. As explained above, a null key press does not generally perform any function but is does inhibit the computer system 142 from switching to a screen saver mode for a pre-determined time after the keystroke.
- FIG. 5 One embodiment of a keyboard in 148 usable in the system 140 of FIG. 4 is illustrated FIG. 5.
- the keyboard 148 includes a conventional “ 8051 ” controller 150 coupled to a key switch matrix 152 by conventional means.
- a program stored in a ROM 156 within the controller 150 controls the operation of the controller 150 .
- the controller 150 contains an internal oscillator generating a clock signal having a frequency determined by a crystal 158 .
- the controller 150 outputs the keyboard clock signal on line KBCLK and keyboard data one line KBDAT, both of which are applied to the keyboard interface controller 78 .
- the proximity sensor 100 is coupled to the controller 150 by conventional names.
- the embodiment illustrated in FIG. 5 is for a “PS/2” keyboard port. However, an “USB” peripheral port for a keyboard and mouse may also be used.
- the proximity sensor 100 uses ultrasound reflected from the operator to detect the proximity of the operator adjacent the proximity sensor 100 .
- the proximity sensor 100 includes a signal generator 160 producing an electrical signal having a desired frequency.
- the output of the signal generator 160 is boosted by an amplifier 162 of conventional design and applied to the input of a conventional ultrasound transducer 164 .
- the transducer 164 then the generates an acoustic signal having a frequency corresponding to the frequency of the electrical signal produced by the signal generator 160 .
- the acoustic signal reflects from objects in the proximity of the computer system, including the operator.
- the transducer 164 converts the reflected acoustic signal to a corresponding electrical signal.
- the electrical signal generated by the transducer 164 will mix with the electrical signal applied to the transducer 164 so that a relatively low frequency signal will be generated having a frequency equal to the difference between the electrical signal applied to the transducer 164 and the frequency of the reflected acoustic signal.
- the frequency of the reflected acoustic signal will vary because of the Doppler effect. Therefore, if an operator is in the proximity of the proximity sensor 100 , a relatively low frequency signal will be present at the output of the transducer 164 .
- This low frequency signal is coupled through a conventional signal conditioning unit 168 that may, for example, filter the high frequency components present at the output of the transducer 164 .
- the signal conditioning unit 168 may also convert the low frequency signal applied to the signal conditioning unit 168 to a direct current (“DC”) signal having a magnitude indicative of the amplitude of the low frequency signal.
- the output of the signal conditioning unit 168 is applied to a threshold detection circuit 170 .
- the threshold attention circuit 170 generates an output signal indicative of the presence of an operator adjacent the proximity sensor 100 whenever the output of the signal conditioning unit 168 exceeds a predetermined magnitude. Thus, the presence or absence of the output signal from the threshold detection circuit 170 indicates whether or not the operator is adjacent the proximity sensor 100 .
- the components illustrated FIG. 6 may also be configured to operate differently.
- the signal conditioning unit 168 may be configured to provide a signal indicative of changes in the amplitude of the electrical signal from the transducer 164 corresponding to the reflected acoustic signal.
- Other alternative designs will also be apparent to one skilled in the art.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Controls And Circuits For Display Device (AREA)
Abstract
Description
- These inventions relates to a method of operating computers, and more particularly, to a method for causing a computer to automatically switch to a screen saver and/or secure operating mode when a computer user leaves the computer.
- Computers, and, more particularly, personal computers, are in widespread use in the home and workplace. Such computers are commonly used to record or process information that the user of the computer desires to maintain confidential. Confidential information present in a computer is typically maintained confidential by placing the computer in a password protected “screen saver” mode. Once the computer has transitioned from a normal operating mode to the password protected screen saver mode, information recorded in the computer can be accessed only after the correct password has been entered by typing the password on a keyboard of the computer. If only authorized users of the computer know the password, the confidential information will be accessible only to authorized users.
- Computers typically automatically switch from the normal operating mode to the password protected screen saver mode after a predetermined period has elapsed since an input device for the computer was last manipulated. Thus, if a user stops using the computer for the predetermined period, the computer automatically switches to the password protected screen saver mode. Generally, the user sets the predetermined period that must lapse before the computer transitions to the screen saver mode. The user may also generally switch the computer to the password protected screen saver mode by pressing a predetermined combination of keys on the keyboard.
- Although computers that are capable of operating in the above-described password protected screen saver mode adequately safeguards confidential information in many instances, it nevertheless has several disadvantages. In particular, if the delay period set by the user to switch the computer to the screen saver mode is excessively long, the computer may be left in the normal operating mode for a considerable period after an authorized user leaves the computer. Individuals who are not authorized to receive such information may then access confidential information present in the computer. It is often difficult if not impossible to select a single delay period that will optimally safeguard confidential information. The delay period should ideally be set to correspond to the period of time that an authorized user may be present at the computer without using the computer. However, this period may vary considerably. Therefore, confidential information can normally be adequately safeguarded only by selecting a very short delay period, i.e., on the order of a few minutes. Alternatively, the computer user can manually switch the computer to the password protected screen saver mode by pressing the predetermined combination of keys on the keyboard.
- Each of the above-described alternatives has serious drawbacks. Selecting a period that is short enough to adequately safeguard confidential information will often cause the computer to switch to the screen saver mode even though the authorized user is still present at the computer, particularly if the user performs other duties while present at the computer. For example, the computer may switch to the password protected screen saver mode while the user is engaging in a telephone conversation. A short delay period will therefore require the computer user to repeatedly type in the password throughout the day, possibly every time the computer is to be used. Requiring that the password be entered many times throughout the day can waste a significant amount of time, and is thus very annoying to many people.
- The other alternative, i.e., relying on the user to type the predetermined combination of keys to switch the computer to the password protected screen saver mode, may fail to adequately protect confidential information. In particular, the computer user may forget to switch the computer to the screen saver mode. The computer user may also choose not to switch the computer to the screen saver mode because he or she expects to be absent from the computer for only a brief period of time. However, the computer user may greatly underestimate the amount of time that he or she will be absent from the computer. In either case, the computer is left unattended in the normal operating mode, thereby making the confidential information readily accessible to unauthorized individuals.
- There is therefore a need for a method of operating a computer using a password protected screen saver in a manner that adequately protects confidential information accessible on the computer, and that does so without significantly inconveniencing authorized users of the computer.
- A screen saver method controls the operating mode of a computer to automatically switch the computer to a screen saver mode when a computer user leaves the proximity of the computer. The screen saver mode is preferably one that requires the user to enter a password before the computer will function in a normal manner. The method includes detecting whether a person is located proximate the computer, and causing the computer to execute a screen saver program responsive to detecting that the person is not located proximate the computer. The act of detecting whether a person is located proximate the computer may include detecting whether there is movement of an object proximate the computer, or detecting whether light, sound, or electromagnetic energy broadcast adjacent the computer is reflected from a person proximate the computer. The act of detecting whether a person is located proximate the computer may also include detecting the weight of the person at a predetermined location proximate the computer.
- FIG. 1 is an isometric view of a computer that may be operated according to various embodiments of the inventive method in which the computer is positioned on a desk proximate a workspace that may be occupied by an individual.
- FIG. 2 is a block diagram of an electronic system that operates in accordance with one embodiment of the inventive method by interfacing a computer with a proximity sensor through a PCI-ISA bus bridge.
- FIG. 3 is a block diagram of an electronic system that operates in accordance with another embodiment of the inventive method by interfacing a computer with a proximity sensor through a keyboard interface microcontroller.
- FIG. 4 is a block diagram of an electronic system that operates in accordance with still another embodiment of the inventive method by interfacing a computer with a proximity sensor through a keyboard.
- FIG. 5 is a block diagram of the keyboard of FIG. 4 showing the manner in which the proximity sensor interfaces with the keyboard.
- FIG. 6 is a block diagram of one embodiment of a proximity sensor that may be used in the embodiments of FIGS.2-5.
- A
computer 10 that operates according to one embodiment of the inventive method is shown in FIG. 1. Thecomputer 10 is placed on the top of a desk D in front of a workspace W positioned behind the desk D that is sometimes occupied by a computer user. Thus, when the computer user is at the workspace W, the user is positioned proximate thecomputer 10. The workspace W may also include a floor pad P adapted to support a chair on which the computer user may sit while occupying the workspace W to work on thecomputer 10. - The
computer 10 includes acomputer chassis 12 of convention design, a convention cathode ray tube (“CRT”) monitor 14 having aCRT screen 16, and aconventional keyboard 18, all of which are placed on the desk D. Thekeyboard 18 also contains aproximity sensor 20 that detects whether or not the computer user is present at the workspace W proximate thecomputer 10. However, in different embodiments, the proximity sensor could alternatively be mounted in thechassis 12, monitor 14, or any other location that is proximate an user operating thecomputer 10. Also, thecomputer 10 could have different components, such as a mouse or other pointing device (not shown) or a unitary chassis, keyboard, and display as in a laptop computer (not shown). - The
computer 10 operates in accordance with an operating system, such as a windows-based operating system like Microsoft Windows® operating system. A number of applications programs, such as a word processor, spreadsheet, database, etc., will also generally be installed on thecomputer 10. The operating system will generally include a “screen saver” program, although a separate “screen saver” application program may also be loaded on thecomputer 10. In either case, the “screen saver” program causes a stationary or moving image to be displayed on thescreen 16 of the monitor 14 in place of an image that would otherwise be displayed by the operating system or currently executing application program. The “screen saver” normally starts running automatically after a user selectable period of time has elapsed since an input device, e.g., thekeyboard 18, was manipulated by the computer user. However, the user may manually cause thecomputer 10 to start executing the screen saver program by pressing a predetermined combination of keys on thekeyboard 18, such as control, shift, and function “F” keys. - The screen saver program, whether a part of the operating system or an application program, can generally operate in either of two modes, namely an unprotected mode or a password protected mode. In the unprotected mode, the
computer 10 stops executing the screen saver program whenever the computer user manipulates an input device, such as thekeyboard 18. Thecomputer 10 then resumes executing whatever program it was executing when thecomputer 10 started executing the screen saver program. In the password-protected mode, the screen saver does not stop executing the screen saver program unless the computer user correctly types in a secret password. If the user types the correct password, thecomputer 10 will discontinue executing the screen saver program and resume executing whatever program it was executing when thecomputer 10 started executing the screen saver program. If the user is unable to type the correct password, thecomputer 10 will not execute any application program regardless of what keys are pressed or other action is taken by the user. Although the various embodiments of the invention may be used with a screen saver program operating in either the unprotected mode or the password protected mode, it is most valuable when the screen saver program is operating in the password protected mode. - As explained above, computer users often unintentionally leave their workstations with their computers executing an applications program for a variety of reasons. Whatever the reason, leaving a
computer 10 unattended without switching it to a password protected screen saver mode can result in disclosure of confidential information to unauthorized individuals. If the computer user does enable the computer to automatically switch to the password protected screen saver mode, the computer user may be required to repetitively enter the password throughout the day, even though the computer user may have never left the workstation. - None of the above-described situations is desirable, and the various embodiments of the invention are directed to solving all or some of these problems. In particular, the
computer 10 shown in FIG. 1 is operated in a manner that avoids the above-described problems by using theproximity sensor 20 to determine whether or not the individual is present at the workspace W proximate thecomputer 10. If the individual is present at the workspace W, thecomputer 10 continues to execute the operating system or application program without executing the screen saver program. When the individual leaves the workspace W, theproximity sensor 20 detects the absence of the individual from the workspace W and causes thecomputer 10 to execute the screen saver, either immediately or after a predetermined delay. Alternatively, thecomputer 10 may begin executing the screen saver before the user leaves the workspace W, but it does not operate in a password protected mode until theproximity sensor 20 detects that the user has left the workspace W. - The
proximity sensors 20 may be any of a variety of conventional or subsequently developed proximity sensors. For example, theproximity sensor 20 may broadcast sound (ultrasound or at another frequency), light (infrared or at another wavelength), electromagnetic energy, etc., and detect whether or not the sound, light, electromagnetic energy, etc. is reflected from an individual present at the workspace W. Theproximity sensor 20 may detect the presence of the individual at the workspace W either directly or by detecting movement of the individual at the workspaceW. Proximity sensors 20 other than reflective proximity sensors mounted on or near thekeyboard 18 or other component of thecomputer 10 may also be used. For example, a weight sensor S (FIG. 1) placed under the floor pad P may be used to detect the presence of the individual sitting in a chair on the floor pad P. Thus, the term “proximity sensor” is intended to encompass any device that determines whether or not the individual proximate thecomputer 10. - One embodiment of an electronic password protected
screen saver system 30 that may operate in according to one embodiment of the invention is illustrated in FIG. 2. Most of the system shown in FIG. 2 is conventional. Thesystem 30 includes than aconventional computer system 32 including aCPU 34 coupled to asystem controller 36 through aCPU bus 38. Thesystem controller 36 includes aDRAM controller 40 that couples theCPU 34 to a dynamic random access memory (“DRAM”) 44 through acontrol bus 46, an address plus 48, and adata bus 50. Thesystem controller 36 also couples theCPU 34 to a peripheral component interconnect (“PCI”)bus 56. ThePCI bus 56 may be coupled to a variety of input output (“I/O”) devices as well as to a PCI-bus bridge 60. ThePCI bus 56 is also coupled to video graphics accelerator (“VGA”)controller 64 that interfaces with both aframe buffer memory 66 and a cathode ray tube (“CRT”) monitor 68. As is a well known in the art, thePCI bus 56 is a relatively high speed bus, and, in conjunction with theVGA controller 64, allows the CRT monitor 68 to display video graphics at a relatively high rate. At the same time, theframe buffer memory 66 stores most of the video data displayed on the CRT monitors 68 so that thePCI bus 56 needs to provide video data to theVGA controller 64 only when corresponding pixels of the video images change. As a result, theVGA controller 64 and theframe buffer memory 66 minimize the burden on thePCI bus 56. - As mentioned above, the
PCI bus 56 is coupled to a PCI-ISA bus bridge 60, which couples thePCI bus 56 to an industry standard architecture (“ISA”)bus 70. As it is a well known in the art, theISA bus 70 is relatively slow compared to thePCI bus 56. TheISA bus 64 is also connected to various I/O devices such as a flash read-only memory (“ROM”) basic input/output system (“BIOS”)memory 74 and aconventional controller 78 that interfaces with akeyboard 80 and amouse pointing device 82. - The PCI-
ISA bus bridge 60 also includes an integrated device electronics (“IDE”)controller 90 that is coupled to a fixeddisk drive 92 for the mass storage of data. - As is well known in the art, the operating system stored on the
hard disk drive 92 may include screen saver software. The screen saver software causes a screen saver image to be displayed on theCRT monitor 68, typically after thecomputer system 32 has been idle for more than a pre-determined period. However, screen savers operating in aconventional computer system 32 of the type shown in FIG. 2 exhibit the problems described above. Specifically,computer system 32 may fail to switch to the screen saver mode soon enough after the operator leaves the proximity of thecomputer system 32. Also, thecomputer system 32 may repeatedly switch to the screen saver mode throughout the day even though the operator remains in the proximity of thecomputer system 32. The operator is thus required to repeatedly enter a screen saver password to use the computer throughout the day. The embodiment of thesystem 30 shown in FIG. 2 avoids these problems by using aproximity sensor 100 that is coupled to a general purpose input port (“GPIO”) conventionally included in the PCI-ISA bus bridge 60. TheCPU 34 is programmed to periodically poll theproximity sensor 100 through the PCI-ISA bus bridge 60. Theproximity sensor 100 may be polled as frequently as each second or faster using a time base provided by a system clock (not shown) included in thecomputer system 32. They operating system stored on thehard disk drive 92 is programmed to forego initiating the screen saver mode unless polling of theproximity sensor 100 indicates that an operator is no longer present in the proximity of thecomputer system 32. If the operator leaves the proximity of thecomputer system 32, theproximity sensor 100 detects his or her absence. When theCPU 34 subsequently polls theproximity sensor 100, theCPU 34 switches thecomputer system 32 to the screen saver mode either immediately or after a pre-determined time. In the later case, if the operator returns to the proximity of thecomputer system 32 during this pre-determined period, thecomputer system 32 is inhibited from switching to the screen saver mode. - An alternative the embodiment of a
system 120 for automatically initiating a screen saver mode is illustrated in FIG. 3. Thesystem 120 includes aconventional computer system 122 containing many of the same components that are in thecomputer system 32 of FIG. 2. Therefore, in the interest of brevity, these components have been provided with the same reference numerals, and an explanation of their structure and operation will not been repeated. - In the system of120 of FIG. 3, the
proximity sensor 100 is coupled to thekeyboard interface microcontroller 78 through a general-purpose input port conventionally included in themicrocontroller 78. Theproximity sensor 100 is polled as frequently as each second or faster using a time base conventionally provided in thekeyboard controller 78. Alternatively, theproximity sensor 100 may be polled as the controller repeatedly executes an internal software loop. When thekeyboard controller 78 detects a signal from theproximity sensor 100 indicating the presence of an operator in the proximity of thecomputer system 122, thekeyboard controller 78 initiates a code sequence that simulates activation of a key on thekeyboard 80. For example, the code sequence may simulate a null key press (e.g., a “shift key”). Activation of a null key does not generally perform any function in an applications program being executed in thecomputer system 122. However, screen saver programs are typically programmed to inhibit switching to a screen saver mode for a pre-determined time after any keystroke. Thus, when thekeyboard controller 78 initiates a code sequence simulating a key press, thecomputer system 122 is inhibited from entering the screen saver mode. Using this embodiment, the parameters of the screen saver program can be set to provide a very short delay time to enter the screen saver mode after thecomputer system 122 has become idle. - Still another embodiment of a
system 140 for automatically initiating a screen saver mode is illustrated in FIG. 4. Thesystem 140 also includes aconventional computer system 142 containing many of the same components that are in thecomputer system 32 of FIG. 2, which have been provided with the same reference numerals. Theproximity sensor 100 is coupled directly to a specially configuredkeyboard 148. Thekeyboard interface microcontroller 78 polls thekeyboard 148 through the general-purpose input port in themicrocontroller 78. Theproximity sensor 100 is polled as frequently as each second or faster each time the software controlling the operation of thekeyboard interface microcontroller 78 passes through its normal keyboard scan routine. One advantage of thesystem 140 of FIG. 4 is that it can be implemented simply by replacing thekeyboard 80 in a conventional computer system with thekeyboard 148. - When the
proximity sensor 100 provides a signal indicating the presence of an operator in the proximity of thecomputer system 142, the signal causes thekeyboard 148 to simulate activation of a key on thekeyboard 148. For example, a null key press may be simulated. As explained above, a null key press does not generally perform any function but is does inhibit thecomputer system 142 from switching to a screen saver mode for a pre-determined time after the keystroke. - One embodiment of a keyboard in148 usable in the
system 140 of FIG. 4 is illustrated FIG. 5. Thekeyboard 148 includes a conventional “8051”controller 150 coupled to akey switch matrix 152 by conventional means. A program stored in aROM 156 within thecontroller 150 controls the operation of thecontroller 150. Thecontroller 150 contains an internal oscillator generating a clock signal having a frequency determined by acrystal 158. Thecontroller 150 outputs the keyboard clock signal on line KBCLK and keyboard data one line KBDAT, both of which are applied to thekeyboard interface controller 78. Theproximity sensor 100 is coupled to thecontroller 150 by conventional names. The embodiment illustrated in FIG. 5 is for a “PS/2” keyboard port. However, an “USB” peripheral port for a keyboard and mouse may also be used. - One embodiment of a
proximity sensor 100 is illustrated in FIG. 6. Theproximity sensor 100 uses ultrasound reflected from the operator to detect the proximity of the operator adjacent theproximity sensor 100. Theproximity sensor 100 includes asignal generator 160 producing an electrical signal having a desired frequency. The output of thesignal generator 160 is boosted by anamplifier 162 of conventional design and applied to the input of aconventional ultrasound transducer 164. Thetransducer 164 then the generates an acoustic signal having a frequency corresponding to the frequency of the electrical signal produced by thesignal generator 160. The acoustic signal reflects from objects in the proximity of the computer system, including the operator. These reflections of the acoustic signal strike thetransducer 164, which then converts the reflected acoustic signal to a corresponding electrical signal. However, the electrical signal generated by thetransducer 164 will mix with the electrical signal applied to thetransducer 164 so that a relatively low frequency signal will be generated having a frequency equal to the difference between the electrical signal applied to thetransducer 164 and the frequency of the reflected acoustic signal. As the operator moves in the proximity of thetransducer 164, the frequency of the reflected acoustic signal will vary because of the Doppler effect. Therefore, if an operator is in the proximity of theproximity sensor 100, a relatively low frequency signal will be present at the output of thetransducer 164. This low frequency signal is coupled through a conventionalsignal conditioning unit 168 that may, for example, filter the high frequency components present at the output of thetransducer 164. Thesignal conditioning unit 168 may also convert the low frequency signal applied to thesignal conditioning unit 168 to a direct current (“DC”) signal having a magnitude indicative of the amplitude of the low frequency signal. The output of thesignal conditioning unit 168 is applied to athreshold detection circuit 170. Thethreshold attention circuit 170 generates an output signal indicative of the presence of an operator adjacent theproximity sensor 100 whenever the output of thesignal conditioning unit 168 exceeds a predetermined magnitude. Thus, the presence or absence of the output signal from thethreshold detection circuit 170 indicates whether or not the operator is adjacent theproximity sensor 100. - It will be apparent to one skilled in the art that the components illustrated FIG. 6 may also be configured to operate differently. For example, the
signal conditioning unit 168 may be configured to provide a signal indicative of changes in the amplitude of the electrical signal from thetransducer 164 corresponding to the reflected acoustic signal. Other alternative designs will also be apparent to one skilled in the art. - While the invention has been described herein by way of exemplary embodiments, various modifications may be made without departing from the spirit and scope of the invention. For example, although the various embodiments of the invention have been described as being methods of operating a system that is an integral part of a computer, it will be understood that the invention may be embodied in methods of operating a separate, stand-alone system that is connected to the
computer 10. Accordingly, the invention is not limited except as by the appended claims.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/037,360 US6401209B1 (en) | 1998-03-09 | 1998-03-09 | Method for automatically initiating a computer security and/or screen saver mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/037,360 US6401209B1 (en) | 1998-03-09 | 1998-03-09 | Method for automatically initiating a computer security and/or screen saver mode |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020056046A1 true US20020056046A1 (en) | 2002-05-09 |
US6401209B1 US6401209B1 (en) | 2002-06-04 |
Family
ID=21893933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/037,360 Expired - Lifetime US6401209B1 (en) | 1998-03-09 | 1998-03-09 | Method for automatically initiating a computer security and/or screen saver mode |
Country Status (1)
Country | Link |
---|---|
US (1) | US6401209B1 (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1406149A2 (en) * | 2002-07-26 | 2004-04-07 | Microsoft Corporation | Capacitive sensing |
US20050044241A1 (en) * | 2003-08-18 | 2005-02-24 | Dunstan Robert A. | Computer system power policy adjustment in response to an affirmative indication from a user |
US20050076242A1 (en) * | 2003-10-01 | 2005-04-07 | Rolf Breuer | Wireless access management and control for personal computing devices |
US20050182962A1 (en) * | 2004-02-17 | 2005-08-18 | Paul Given | Computer security peripheral |
US20060158441A1 (en) * | 2005-01-17 | 2006-07-20 | I-Shu Lee | Timing control circuit with personal identification function and application thereof |
US20060195699A1 (en) * | 2005-02-16 | 2006-08-31 | Shun-Yung Liao | Power saving and system security method for computer system |
US20060261974A1 (en) * | 2004-07-23 | 2006-11-23 | Innovalarm Corporation | Health monitoring using a sound monitoring screen saver |
US20080120686A1 (en) * | 2006-11-20 | 2008-05-22 | Jingrong Gao | Applying compliance standards to a computer within a grouping hierarchy |
US20090064338A1 (en) * | 2007-08-29 | 2009-03-05 | International Business Machines Corporation | Proximity sensitive blade server security |
US20110087705A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating management of social media information for communication devices |
US20110088086A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Locking and unlocking of an electronic device using a sloped lock track |
WO2011080517A2 (en) | 2010-01-04 | 2011-07-07 | Plastic Logic Limited | Electronic document reading devices |
US20110195665A1 (en) * | 2010-02-08 | 2011-08-11 | Daniel Friedlaender | Method, apparatus, and use of presence detection |
FR2957694A1 (en) * | 2010-03-19 | 2011-09-23 | Florent Piquerel | Device for detecting end of utilization of workstation and activating stand-by mode of computer, has plate positioned on keyboard support carrier, and sensor detecting re-entry of carrier to determine end of utilization of computer |
US20140055483A1 (en) * | 2008-09-26 | 2014-02-27 | Apple Inc. | Computer User Interface System and Methods |
US20150040215A1 (en) * | 2013-07-31 | 2015-02-05 | Xerox Business Services, Llc | Remote customer relationship management activity workspace |
US9047472B2 (en) * | 2013-01-14 | 2015-06-02 | International Business Machines Corporation | Managing sensitive content |
WO2022049215A1 (en) * | 2020-09-02 | 2022-03-10 | Crisp Thinking Group Limited | Computer security system and method |
US11341222B1 (en) * | 2018-08-21 | 2022-05-24 | Smart Eye Technology, Inc. | System and method for securely viewing, editing and sharing documents and other information |
US20220357959A1 (en) * | 2021-05-04 | 2022-11-10 | Tricklestar Limited | Keyboard |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6367020B1 (en) | 1998-03-09 | 2002-04-02 | Micron Technology, Inc. | System for automatically initiating a computer security and/or screen saver mode |
JPH11298656A (en) * | 1998-04-15 | 1999-10-29 | Sony Corp | Information providing method and communication terminal equipment |
US6374145B1 (en) * | 1998-12-14 | 2002-04-16 | Mark Lignoul | Proximity sensor for screen saver and password delay |
US6560711B1 (en) | 1999-05-24 | 2003-05-06 | Paul Given | Activity sensing interface between a computer and an input peripheral |
KR100335092B1 (en) * | 2000-07-04 | 2002-05-04 | 구자홍 | Drive Control Method for Display Device |
US6654003B2 (en) * | 2000-12-01 | 2003-11-25 | International Business Machines Corporation | Cursor control device |
US7185281B2 (en) * | 2001-01-18 | 2007-02-27 | Square D Company | Remote metering display with motion sensor |
US6802016B2 (en) * | 2001-02-08 | 2004-10-05 | Twinhead International Corp. | User proximity sensor and signal processing circuitry for determining whether to power a computer on or off |
US20020196294A1 (en) * | 2001-06-26 | 2002-12-26 | Robert Sesek | Calendar screensaver for a computer display |
US20030074590A1 (en) * | 2001-10-12 | 2003-04-17 | Fogle Steven L. | Computer system with improved entry into powersave and lock modes and method of use therefor |
US7437765B2 (en) * | 2002-06-04 | 2008-10-14 | Sap Aktiengesellschaft | Sensitive display system |
US20040051813A1 (en) * | 2002-09-17 | 2004-03-18 | Koninlijke Philips Electronics N.V. | Television power saving system |
KR100498030B1 (en) * | 2002-12-26 | 2005-07-01 | 삼성전자주식회사 | Image displayer with rejection of an afterimage automatically and it's rejection method of the afterimage |
US20050086515A1 (en) * | 2003-10-15 | 2005-04-21 | Paris Clifford D. | Motion detecting computer control device |
US7400878B2 (en) | 2004-02-26 | 2008-07-15 | Research In Motion Limited | Computing device with environment aware features |
US7583551B2 (en) | 2004-03-10 | 2009-09-01 | Micron Technology, Inc. | Power management control and controlling memory refresh operations |
US7061366B2 (en) * | 2004-04-12 | 2006-06-13 | Microsoft Corporation | Finding location and ranging explorer |
NZ551164A (en) * | 2004-07-14 | 2009-12-24 | Keyghost Ltd | Keystroke monitoring apparatus and method |
WO2006088752A2 (en) * | 2005-02-17 | 2006-08-24 | Advanced Input Devices, Inc. | Keyboard assembly |
US7298272B2 (en) * | 2005-04-29 | 2007-11-20 | Hewlett-Packard Development Company, L.P. | Remote detection employing RFID |
US7330119B2 (en) * | 2005-04-29 | 2008-02-12 | Hewlett-Packard Development Company, L.P. | Remote measurement employing RFID |
US7330120B2 (en) * | 2005-04-29 | 2008-02-12 | Hewlett-Packard Development Company, L.P. | Remote measurement of motion employing RFID |
US7737847B2 (en) * | 2005-06-30 | 2010-06-15 | Hewlett-Packard Development Company, L.P. | Wireless monitoring for an electronics system |
US7336153B2 (en) * | 2005-06-30 | 2008-02-26 | Hewlett-Packard Development Company, L.P. | Wireless temperature monitoring for an electronics system |
US7400252B2 (en) * | 2005-06-30 | 2008-07-15 | Hewlett-Packard Development Company, L.P. | Wireless monitoring of component compatibility in an electronics system |
US7607014B2 (en) * | 2005-06-30 | 2009-10-20 | Hewlett-Packard Development Company, L.P. | Authenticating maintenance access to an electronics unit via wireless communication |
US7684821B2 (en) * | 2005-09-27 | 2010-03-23 | Research In Motion Limited | Multi-tap keyboard user interface |
US7845013B2 (en) * | 2006-05-30 | 2010-11-30 | International Business Machines Corporation | Method and system for protecting the security of an open file in a computing environment |
US8789089B2 (en) * | 2007-12-03 | 2014-07-22 | Lawrence J. Koncelik, Jr. | Setting television or radio default channel |
US9020167B2 (en) | 2007-12-03 | 2015-04-28 | Lawrence J. Koncelik, Jr. | Setting television or radio default channel |
US20100186234A1 (en) | 2009-01-28 | 2010-07-29 | Yehuda Binder | Electric shaver with imaging capability |
US20100318236A1 (en) * | 2009-06-11 | 2010-12-16 | Kilborn John C | Management of the provisioning of energy for a workstation |
US8464083B1 (en) * | 2010-06-20 | 2013-06-11 | Google Inc. | Exiting low-power state without requiring user authentication |
WO2012036324A1 (en) | 2010-09-13 | 2012-03-22 | 엘지전자 주식회사 | Mobile terminal and method for controlling operation thereof |
KR101824413B1 (en) | 2011-08-30 | 2018-02-02 | 삼성전자주식회사 | Method and apparatus for controlling operating mode of portable terminal |
US9066125B2 (en) | 2012-02-10 | 2015-06-23 | Advanced Biometric Controls, Llc | Secure display |
US8972762B2 (en) | 2012-07-11 | 2015-03-03 | Blackberry Limited | Computing devices and methods for resetting inactivity timers on computing devices |
US9411048B2 (en) | 2012-08-30 | 2016-08-09 | Apple Inc. | Electronic device with adaptive proximity sensor threshold |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5202929A (en) * | 1979-09-24 | 1993-04-13 | Lemelson Jerome H | Data system and method |
US5007085A (en) * | 1988-10-28 | 1991-04-09 | International Business Machines Corporation | Remotely sensed personal stylus |
US4947765A (en) * | 1989-04-25 | 1990-08-14 | National Bulletproof, Inc. | Security apparatus and method of using same |
US5377269A (en) * | 1992-10-29 | 1994-12-27 | Intelligent Security Systems, Inc. | Security access and monitoring system for personal computer |
US5548764A (en) * | 1993-04-30 | 1996-08-20 | Advanced Micro Devices, Inc. | Power interrupt device with remote activity detector |
US5574424A (en) * | 1994-05-09 | 1996-11-12 | Nguyen; Duc M. | Anti-car jacking/theft device |
US5629981A (en) * | 1994-07-29 | 1997-05-13 | Texas Instruments Incorporated | Information management and security system |
US5752044A (en) * | 1995-06-07 | 1998-05-12 | International Business Machines Corporation | Computer system having multi-level suspend timers to suspend from operation in attended and unattended modes |
US5848231A (en) * | 1996-02-12 | 1998-12-08 | Teitelbaum; Neil | System configuration contingent upon secure input |
US6088450A (en) * | 1996-04-17 | 2000-07-11 | Intel Corporation | Authentication system based on periodic challenge/response protocol |
US5835083A (en) * | 1996-05-30 | 1998-11-10 | Sun Microsystems, Inc. | Eyetrack-driven illumination and information display |
US5949882A (en) * | 1996-12-13 | 1999-09-07 | Compaq Computer Corporation | Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm |
US5887131A (en) * | 1996-12-31 | 1999-03-23 | Compaq Computer Corporation | Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password |
US6070240A (en) * | 1997-08-27 | 2000-05-30 | Ensure Technologies Incorporated | Computer access control |
US5983273A (en) * | 1997-09-16 | 1999-11-09 | Webtv Networks, Inc. | Method and apparatus for providing physical security for a user account and providing access to the user's environment and preferences |
US6189105B1 (en) * | 1998-02-20 | 2001-02-13 | Lucent Technologies, Inc. | Proximity detection of valid computer user |
US5959530A (en) * | 1998-07-29 | 1999-09-28 | Xerox Corporation | Remote computer security system for computers, printers and multifunction devices |
US6308272B1 (en) * | 1998-12-21 | 2001-10-23 | International Business Machines Corporation | Security system using existing network and personal computers |
US6282655B1 (en) * | 1999-05-24 | 2001-08-28 | Paul Given | Keyboard motion detector |
-
1998
- 1998-03-09 US US09/037,360 patent/US6401209B1/en not_active Expired - Lifetime
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1406149A3 (en) * | 2002-07-26 | 2006-06-21 | Microsoft Corporation | Capacitive sensing |
EP1406149A2 (en) * | 2002-07-26 | 2004-04-07 | Microsoft Corporation | Capacitive sensing |
US20050044241A1 (en) * | 2003-08-18 | 2005-02-24 | Dunstan Robert A. | Computer system power policy adjustment in response to an affirmative indication from a user |
WO2005020052A2 (en) * | 2003-08-18 | 2005-03-03 | Intel Corporation | Computer system power policy adjustment in response to a user request |
WO2005020052A3 (en) * | 2003-08-18 | 2005-04-21 | Intel Corp | Computer system power policy adjustment in response to a user request |
US7353413B2 (en) | 2003-08-18 | 2008-04-01 | Intel Corporation | Computer system power policy adjustment in response to an affirmative indication from a user |
US20050076242A1 (en) * | 2003-10-01 | 2005-04-07 | Rolf Breuer | Wireless access management and control for personal computing devices |
US20050182962A1 (en) * | 2004-02-17 | 2005-08-18 | Paul Given | Computer security peripheral |
US20060261974A1 (en) * | 2004-07-23 | 2006-11-23 | Innovalarm Corporation | Health monitoring using a sound monitoring screen saver |
US20100033474A1 (en) * | 2005-01-17 | 2010-02-11 | Au Optronics Corporation | Display device and control method thereof |
US20060158441A1 (en) * | 2005-01-17 | 2006-07-20 | I-Shu Lee | Timing control circuit with personal identification function and application thereof |
US8325168B2 (en) * | 2005-01-17 | 2012-12-04 | Au Optronics Corporation | Display device and control method thereof |
US20060195699A1 (en) * | 2005-02-16 | 2006-08-31 | Shun-Yung Liao | Power saving and system security method for computer system |
US7870594B2 (en) | 2006-11-20 | 2011-01-11 | International Business Machines Corporation | Applying compliance standards to a computer within a grouping hierarchy |
US20080120686A1 (en) * | 2006-11-20 | 2008-05-22 | Jingrong Gao | Applying compliance standards to a computer within a grouping hierarchy |
US20090064338A1 (en) * | 2007-08-29 | 2009-03-05 | International Business Machines Corporation | Proximity sensitive blade server security |
US20140055483A1 (en) * | 2008-09-26 | 2014-02-27 | Apple Inc. | Computer User Interface System and Methods |
US9513797B2 (en) | 2009-10-14 | 2016-12-06 | At&T Mobility Ii Llc | Locking and unlocking of an electronic device using a sloped lock track |
US9736106B2 (en) | 2009-10-14 | 2017-08-15 | At&T Mobility Ii Llc | Apparatus, methods and computer-readable storage media for security provisioning at a communication device |
US20110088003A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Apparatus, methods and computer-readable storage media for security provisioning at a communication device |
US20110087970A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating integrated messaging, contacts and social media for a selected entity |
US20110087749A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating information sharing via communication devices |
US10979380B2 (en) | 2009-10-14 | 2021-04-13 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating management of social media information for communication devices |
US10708218B2 (en) | 2009-10-14 | 2020-07-07 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating heterogeneous messaging for a communication device |
US10541964B2 (en) | 2009-10-14 | 2020-01-21 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating integrated messaging, contacts and social media for a selected entity |
US20110088086A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Locking and unlocking of an electronic device using a sloped lock track |
US8615557B2 (en) | 2009-10-14 | 2013-12-24 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating information sharing via communication devices |
US20110087994A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating information retrieval for a communication device |
US8881025B2 (en) | 2009-10-14 | 2014-11-04 | At&T Mobility Ii, Llc | Systems, apparatus, methods and computer-readable storage media facilitating heterogeneous messaging for a communication device |
US8924893B2 (en) | 2009-10-14 | 2014-12-30 | At&T Mobility Ii Llc | Locking and unlocking of an electronic device using a sloped lock track |
US10484330B2 (en) | 2009-10-14 | 2019-11-19 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating information retrieval for a communication device |
US10243910B2 (en) | 2009-10-14 | 2019-03-26 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating heterogeneous messaging for a communication device |
US10126919B2 (en) | 2009-10-14 | 2018-11-13 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating management of social media information for communication devices |
US9172669B2 (en) | 2009-10-14 | 2015-10-27 | At&T Mobility Ii Llc | Apparatus, methods and computer-readable storage media for security provisioning at a communication device |
US9424444B2 (en) | 2009-10-14 | 2016-08-23 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating integrated messaging, contacts and social media for a selected entity |
US9477849B2 (en) | 2009-10-14 | 2016-10-25 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating management of social media information for communication devices |
US20110087705A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media for facilitating management of social media information for communication devices |
US9600141B2 (en) | 2009-10-14 | 2017-03-21 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating information retrieval for a communication device |
US20110087972A1 (en) * | 2009-10-14 | 2011-04-14 | At&T Mobility Ii Llc | Systems, apparatus, methods and computer-readable storage media facilitating heterogeneous messaging for a communication device |
WO2011080517A2 (en) | 2010-01-04 | 2011-07-07 | Plastic Logic Limited | Electronic document reading devices |
US9002272B2 (en) | 2010-02-08 | 2015-04-07 | Daniel Friedlaender | Method, apparatus, and use of presence detection to control a function of a device requiring a pairing security level |
US20110195665A1 (en) * | 2010-02-08 | 2011-08-11 | Daniel Friedlaender | Method, apparatus, and use of presence detection |
FR2957694A1 (en) * | 2010-03-19 | 2011-09-23 | Florent Piquerel | Device for detecting end of utilization of workstation and activating stand-by mode of computer, has plate positioned on keyboard support carrier, and sensor detecting re-entry of carrier to determine end of utilization of computer |
US9047472B2 (en) * | 2013-01-14 | 2015-06-02 | International Business Machines Corporation | Managing sensitive content |
US9684354B2 (en) * | 2013-07-31 | 2017-06-20 | Conduent Business Services, Llc | Remote customer relationship management activity workspace |
US20150040215A1 (en) * | 2013-07-31 | 2015-02-05 | Xerox Business Services, Llc | Remote customer relationship management activity workspace |
US11341222B1 (en) * | 2018-08-21 | 2022-05-24 | Smart Eye Technology, Inc. | System and method for securely viewing, editing and sharing documents and other information |
WO2022049215A1 (en) * | 2020-09-02 | 2022-03-10 | Crisp Thinking Group Limited | Computer security system and method |
US20220357959A1 (en) * | 2021-05-04 | 2022-11-10 | Tricklestar Limited | Keyboard |
Also Published As
Publication number | Publication date |
---|---|
US6401209B1 (en) | 2002-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6401209B1 (en) | Method for automatically initiating a computer security and/or screen saver mode | |
US6367020B1 (en) | System for automatically initiating a computer security and/or screen saver mode | |
US6192478B1 (en) | Securing restricted operations of a computer program using a visual key feature | |
TW588284B (en) | Computer real-time power-on system and method | |
US6121962A (en) | Computer system and method for controlling screen display of a monitor in a power management mode | |
US6798887B1 (en) | Key click masker and method for masking key clicks | |
USRE43716E1 (en) | Method of fast switching control for different operation systems operated in computer | |
US8645671B2 (en) | Direct computing experience | |
US7716599B2 (en) | System and computer program for controlling screen focus for files and applications during presentations | |
EP0868079A2 (en) | Power management schemes for apparatus with converged functionalities | |
US20030107600A1 (en) | Providing a user input interface prior to initiation of an operating system | |
US20060064571A1 (en) | Systems, methods, and apparatus for providing efficient startup to computers with peripheral devices | |
CA2311767A1 (en) | Soft input panel system and method | |
US20040139351A1 (en) | Method and apparatus for generating secured attention sequence | |
US5911777A (en) | Method and apparatus for reporting unauthorized attempt to release a portable computer from a docking station | |
EP1335282A2 (en) | Resetting embedded devices | |
US20110029896A1 (en) | System and method for controlling multiple computers | |
US20030107557A1 (en) | Control of unintended single-tap actuation of a computer touch pad pointing device | |
US6246397B1 (en) | Screen saver computer program prohibition based on storage device activity | |
US8694914B2 (en) | Method and apparatus to control the display of windows in a processing system | |
US7089508B1 (en) | Method and system for preventing the activation of a computer screen saver | |
US5664097A (en) | System for delaying the activation of inactivity security mechanisms by allowing an alternate input of a multimedia data processing system | |
US5968173A (en) | Method and system for maximizing the apparent initial processing capability of a computer | |
US20040093490A1 (en) | Method for activating a computer system audio player with hot key | |
JP2004213323A (en) | Computer and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICRON ELECTRONICS, INC., IDAHO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KLEIN, DEAN;REEL/FRAME:009033/0171 Effective date: 19980225 |
|
AS | Assignment |
Owner name: MEI CALIFORNIA, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICRON ELECTRONICS, INC.;REEL/FRAME:011658/0956 Effective date: 20010322 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001 Effective date: 20160426 Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN Free format text: SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038669/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001 Effective date: 20160426 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:038954/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT, CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001 Effective date: 20160426 Owner name: U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGEN Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REPLACE ERRONEOUSLY FILED PATENT #7358718 WITH THE CORRECT PATENT #7358178 PREVIOUSLY RECORDED ON REEL 038669 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MICRON TECHNOLOGY, INC.;REEL/FRAME:043079/0001 Effective date: 20160426 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:U.S. BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT;REEL/FRAME:047243/0001 Effective date: 20180629 |
|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:050937/0001 Effective date: 20190731 |