WO1997042559A1 - Systeme de securite pour ordinateur personnel - Google Patents

Systeme de securite pour ordinateur personnel Download PDF

Info

Publication number
WO1997042559A1
WO1997042559A1 PCT/JP1997/001386 JP9701386W WO9742559A1 WO 1997042559 A1 WO1997042559 A1 WO 1997042559A1 JP 9701386 W JP9701386 W JP 9701386W WO 9742559 A1 WO9742559 A1 WO 9742559A1
Authority
WO
WIPO (PCT)
Prior art keywords
display
screen
personal computer
operator
security system
Prior art date
Application number
PCT/JP1997/001386
Other languages
English (en)
Japanese (ja)
Inventor
Katsuhiko Okada
Original Assignee
Iwamoto, Hideji
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iwamoto, Hideji filed Critical Iwamoto, Hideji
Priority to AU25776/97A priority Critical patent/AU2577697A/en
Priority to JP9539729A priority patent/JP3031637B2/ja
Publication of WO1997042559A1 publication Critical patent/WO1997042559A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Definitions

  • the present invention mainly relates to a security system for a personal computer used in an office, a store, a research laboratory, a computer center, or the like, in a place where others may enter near an operation area.
  • the ID force must be carried at all times, which is cumbersome for management, and leaving the ID card near the desk of the personal computer and leaving the seat has no effect.
  • the ID card is lost or the ID card is handed over to another person, there is a problem that the operator himself cannot operate.
  • the start-up time of the screen saver that enters the dark state can be changed by the user, and when a relatively long time is set, the operator actually leaves the seat.
  • the screen remains for, for example, about one minute immediately after leaving the desk, and if a third party moves the cursor on the screen by touching the mouse etc. during this time, the saver function does not work, and the security code input is disabled. There is a problem that it is possible to operate by a third party without passing through and effective security cannot be achieved.
  • the main object of the present invention is to realize control corresponding to the actual absence of an operator, and to achieve reliable security while simplifying management without having to carry an ID card or the like.
  • the aim is to provide a security system for personal computers. Disclosure of the invention
  • the invention described in claim 1 has a human sensor 1 provided on a personal computer as shown in FIGS. 1 to 6, 9 and 10.
  • the system is provided with a screen erasing means 2 for erasing the display after detecting the absence of the operator, and a screen restoring means 3 for restoring the display on the display which has been erased by inputting a pass-code.
  • the human detection sensor 1 is a sensor for detecting an object such as a person, and is not a sensor for detecting electric machinery and the like, such as an ID force carried by a person.
  • a typical example is an infrared sensor that detects infrared rays emitted from the human body at a specific wavelength (wavelength band of about 7 / m to 14 zm).
  • Others beating sensor, CCD image sensor, thermal image sensor A sensor, optical sensor, ultrasonic sensor (ultrasonic distance meter, etc.) can be used.
  • the personal computer referred to here is a so-called office computer (office computer), a family computer (family computer), a special purpose computer such as a word processor, a game machine, or the like. Including.
  • a computer that functions as a personal computer by combining a normal television screen and a control unit is also included.
  • turning off the display on the display means that the work screen on the normal program is turned off here, and the display screen is completely turned off or solid black.
  • it also includes the one that switches the display to another pattern or moving image on the display by a command and turns off the work screen.
  • the display power line is turned off.
  • the analog RGB signal line is turned off by controlling the signal on the display signal line. This includes those that enhance the display of the screen.
  • the invention described in claim 2 is the same as the invention described in claim 1, except that the display is turned on when the power is turned on as shown in FIGS.
  • the initial screen dark control means 20 for maintaining the display in the dark state and the initial screen display means 21 for displaying the initial screen of the display by inputting a pass code are provided.
  • the invention described in claim 3 achieves the above-mentioned main object in the same manner as in claim 1, and as shown in FIGS. 11 and 12, a human detection sensor 1 provided on the personal computer side, Screen erasing means that turns off the display on the display after detecting the absence of the operator in 1)
  • Screen erasing means that turns off the display on the display after detecting the absence of the operator in 1)
  • the screen is provided with a screen restoration means 3 for restoring the display of the display which has been deleted based on the information.
  • Physical personal information includes all kinds of unique information that differs from individual to individual, such as the retinal vascular pattern (retinal pattern), the iris pattern of the eyeball, fingerprints, voiceprints, signature handwriting, etc. Including.
  • the invention described in claim 4 is similar to the invention described in claim 2 in that the invention described in claim 3 is shown in FIGS.
  • Control unit 20 displays the initial screen of the display based on the comparison between the entered physical personal information and the registered personal information.
  • a configuration is provided in which the initial screen display means 21 is provided.
  • the invention described in claim 5 is the invention according to claims 1 to 4, wherein the display is not turned off each time when leaving the seat for a very short time, such as picking up a writing implement etc. dropped on the floor. In this way, as shown in Figs.
  • Tb is configured to include a screen automatic return unit 31 for returning the display on the display without input for the screen return based on the human detection sensor 1.
  • the invention set forth in claim 7 is the same as the invention described in claims 1 to 6, except that not only erasing the display but also more actively preventing manipulation of the program such as falsification is performed.
  • a command cut unit 4 that cuts command input when the display is erased by the screen erase unit 2 is provided.
  • the command cutting means 4 mainly prevents input from input means such as a keyboard, a mouse, a microphone, and a force reader. You.
  • the invention set forth in claim 8 is the invention according to claims 1 to 7, wherein another person or the like is prevented from unintentionally turning off the power while the display is being erased, and time and effort for restarting the display.
  • a configuration is provided in which a power-off prohibiting means 40 for prohibiting the power-off when the display is erased by the screen erasing means 2 is provided.
  • the invention described in claim 9 is different from the invention described in claim 7 in that the input of a command is forced in conjunction with the deletion of the screen.
  • the screen automatic return means 31 is used as shown in Figures 6, 10 and 12. After the input-less automatic screen return period Tb has elapsed, a command cutting means 41 is provided to force the input of a command.
  • the invention described in claim 10 is different from the invention described in claim 8 in that the power-off is prohibited in conjunction with the screen erasure. Or, in combination with the invention described in 9, in order to prohibit the power-off only when it is really necessary to leave the operator for a long time, the screen automatic return means 31 is used as shown in Figs.
  • a configuration is provided in which a power-off prohibiting means 410 is provided to prohibit power-off after the inputless screen automatic return period Tb has elapsed.
  • the invention described in claim 11 is based on the inventions described in claims 1 to 10 and is mainly intended for a computer center or the like. As shown in Fig. 3 or Fig. 4, in order to further manage the personnel of the operator and further enhance its security, it is installed at the gate of the room where the personal computer is installed. The system is provided with a usage permitting means 7 for permitting the use of the personal computer by the qualified person when entering the room.
  • the invention set forth in claim 12 is the invention according to claim 11, further comprising the step of managing the personnel of the operator even when the use of the personal computer is completed, and further increasing t ⁇
  • the system is provided with a use cutting means 8 for cutting the use of the personal computer of the person leaving the gate.
  • the human sensor when the operator leaves the seat during the operation of the personal computer P (? 1 or? 2), the human sensor The absence of the seat is detected by 1, and the display on the display D disappears later by the screen erasing means 2. Even if someone who does not know the password eventually takes a seat, the screen will not return unless you enter the password, so others may look at the screen, steal the program, or operate without permission No, security is maintained.
  • the screen display means 3 returns the erased display on the display D, and the operation can be easily continued.
  • the display D is turned off by the screen erasing means 2 according to the present invention. It will not be. This is because the presence of the operator is confirmed by the human sensor 11. In a personal computer having a screen saver function, even if the screen disappears due to the continuation of the still screen, this has nothing to do with the control by the screen erasing means 2 of the present invention. In this way, when the operator simply stops operating, even if the screen disappears with the conventional screen saver, no password entry is required when returning to the screen.
  • the display is controlled by the initial screen dark control means 20 as shown in FIGS. Is kept dark and cannot be used.
  • the authorized operator causes the initial screen display means 21 to display the initial screen of the display, and can perform subsequent processing.
  • regular operations Actual use can be limited only to Lei Yu, and the use by others can be eliminated from the beginning.
  • FIGS. 11 and 12 when the operator leaves during the operation of the personal computer P, the presence of the person is detected by the human detection sensor 11 and later, The display D is turned off by the screen erasing means 2.
  • the initial screen and the control means 20 can be used.
  • the display is kept in the ⁇ state and cannot be used.
  • the authorized operator can input his / her physical and personal information, display the initial screen of the display by the initial screen display means 21, and perform subsequent processing. In this way, actual use can be limited only to authorized operators from the beginning, and inadvertent use by others can be eliminated from the beginning.
  • the screen automatic return means 31 allows the operator to formally enter Tb within a short period of time when the display disappears. When you get to your seat, your password and personal information will be The screen returns without any input for returning the screen such as physical personal information (Figs. 7 and 8)
  • the power-off prohibiting means 40 when the display D is being erased by the screen erasing means 2 due to the absence of the operator as shown in FIGS. 9 and 11, at the same time, the power-off prohibiting means 40 is used. However, since power-off is prohibited, it is possible to solve the problem that another person or the user inadvertently turns off the power during the operation and interrupts the process, corrupting the file or requiring time and effort to start up again.
  • the command cut means 41 is used in combination with the automatic screen return means 31 as shown in FIGS. (2) As shown in (2) and (B) (2), the command input is cut by the command cutting means 41 after a lapse of the period Tb during which the screen can be automatically returned without input. For this reason, when it is really necessary to ensure security, it is possible to eliminate tampering of the program by others and to avoid waste of control.
  • the power-off prohibiting means 4 10 is used in combination with the screen automatic return means 31 to display the screen without input. After the elapse of the recovery period Tb, the power supply is prohibited (Fig. 8 (A) 2 and
  • Access to the room where the computer is installed can be restricted to only those who are eligible for the gate by the personal identification device 6, and when the person who is eligible for the gate enters the room, the personal computer of the person who enters the room is permitted by the use permission means 7. Will be available. For this reason, even when starting to use, only authorized operators can operate it, and it is possible to eliminate the unauthorized use of others, thus further improving security.
  • FIG. 1 is a configuration diagram of a first embodiment of the present invention
  • FIG. 2 is a configuration diagram of the second embodiment
  • FIG. 3 is a configuration diagram of the third embodiment
  • FIG. 4 is a configuration diagram of the fourth embodiment
  • FIG. 5 is a configuration diagram of the fifth embodiment
  • FIG. 6 is a configuration diagram of the sixth embodiment
  • FIG. 7 is an explanatory diagram of the operation of the screen automatic return means 31.
  • FIG. 8 is a diagram for explaining the operation of the second command cutting means 41.
  • FIG. 9 is a configuration diagram of a seventh embodiment of the present invention.
  • FIG. 10 is a configuration diagram of the eighth embodiment
  • FIG. 11 is a configuration diagram of the ninth embodiment
  • FIG. 12 is a configuration diagram of the tenth embodiment. BEST MODE FOR CARRYING OUT THE INVENTION
  • P is a personal computer including a CPU body C, a display D, a keyboard K, and a mouse.
  • the power cable ⁇ of the display D is connected to the CPU body C, and receives power from the CPU body C.
  • the 10 is the main body of the box-shaped security system.
  • a sandwich is interposed between the main body and the display D.
  • On the front is a human sensor consisting of an infrared sensor that detects infrared rays emitted from the human body-1, a numeric keypad 30 for entering a password such as a 4-digit password, and an adjustment knob for setting the delay for one hour. 50 is provided. Needless to say, the number of passwords is arbitrary.
  • a control unit composed of a microcomputer, a sequence controller, an electric circuit, etc., is provided inside the main body 10.
  • the human body sensor 1 detects the absence of the operator and then turns off the display D.
  • a screen restoration means 3 for restoring the display on the display D which has been erased by inputting a passcode from the ten keys 30 is constructed.
  • the display on display D may be turned off as soon as the human sensor 1 detects that the operator is away, but in this case, the operator's absence from the human sensor 1 is set for a certain time, that is, the adjustment knob 50 is set.
  • Reference numeral 23 denotes a switch for erasing or restoring the display on the display D in response to a command from the screen erasing means 2 or the screen restoring means 3, and turns on / off the line of the power cable E of the display D. That is, the display is turned off by turning off the power supply line, and the display is restored by turning on the power supply line.
  • the connector at the end of the power cable E and the switch section 23 are not easily detached by using a screw fitting structure or the like. This is because others This is to prevent abuse such as disconnecting the power cable E from the switch 23 and connecting it to another power outlet to display the screen.
  • the switch portion 23 may be integrally provided at an intermediate portion of the power cable E, or may be incorporated inside the display D.
  • Figure 2 shows the command cutting means for cutting off the input of commands from keyboard K and mouse M when screen D is erased by screen erasing means 2 after leaving the desk for more than one hour. 4 is provided. In this way, it is possible to more positively prevent others from tampering with the program without permission.
  • Fig. 3 shows an example of application to a computer center R where multiple personal computers P1, P2, ... are installed.
  • a gate section 9 having a first door 91 and a second door 92 is provided in the gate section as an entrance and exit section (this section is shown in a plan view from above). Sections are formed.
  • Each of the doors 9 1 and 9 2 is provided with a transparent body made entirely or partially of tempered glass, so that the inside and outside can be visually recognized, and a closed-door accident can be prevented.
  • the size of the gate zone 9 is, for example, a square shape of 90 cm square in a plane view, such that an adult can enter inside while standing, and free movement of limbs is not hindered.
  • the height from the floor to the ceiling is about 210 cm. The size may be arbitrarily large or small according to the frequency of traffic.
  • the first door 91 is automatically opened for a certain period of time by inputting a password from the numeric keypad operation section 911, and a prospective person can enter the gate zone 9. From inside the gate zone 9, you can go outside freely by operating the evening switch 912.
  • a personal identification device 6 including a retinal identification device is installed inside the gate zone 9.
  • the windows for detecting retinal patterns are placed at the height of the eyes of short people.
  • the retinal identification device 6 reads a blood vessel pattern on the retina using infrared rays, and identifies whether or not the detected retinal pattern matches a pre-registered person's retinal pattern.
  • a fingerprint identification device, a signature identification device, a voice identification device, or the like may be used as the personal identification device 6. it can.
  • one-person detection detects whether there is one or more persons under the situation where it is unknown to the participant whether there is a floor area for detecting one person in the gate zone 9.
  • a sensor is provided. The details are as follows: A single person area A with a size of 70 cm is required and large enough to allow one adult to stop at the personal identification device 6 just before the personal identification device 6 and to reach it.
  • the area marked with is separated from the other surrounding area B, and the floor above the floor to detect the situation where no one straddles the boundary between the two areas A and B, and only one person stands alone in area A
  • At the foot (about 30 cm above the floor) six footstep sensors S1 to S6 for detecting others, and below the personal identification device 6 (slightly below the chest), the person standing alone in the area A. It consists of a person detection sensor S0 for confirming entry, and ceiling sensors S7 and S8 for detecting others, which are arranged near the back of the ceiling in order to more reliably eliminate accompanying rooms such as piggybacks and shoulders.
  • Each sensor can be installed in each of the doors 91 and 92, but all sensors should be installed on a stationary member such as the partition wall of the gate zone 9 in order to improve installation and stability of detection. ing.
  • a transmission type optical sensor or an ultrasonic sensor having a transmission unit and a reception unit facing each other is used.
  • the foot sensors S3 to S6, which demarcate the orthogonal boundary line with each house 91, 92, the identity detection sensor S0, the ceiling sensors S7, S8 are reflective optical sensors and ultrasonics. Sensors and infrared sensors are used.
  • Each of the sensors S0 to S8 is input to an on-board personnel number judging means 90 constructed on a controller 100 composed of a computer, a microcomputer, a sequence controller, or the like.
  • a controller 100 composed of a computer, a microcomputer, a sequence controller, or the like.
  • the foot sensors S 1 to S 6 there is no obstacle on the trajectory of the non-visible signal such as light guide, and no person straddles the boundary between the above two areas A and B.
  • the ceiling sensors S7 and S8 also detect that there are no obstacles on the trajectory of invisible signals such as light guides, and that there is no piggyback ride. Go to Gate Zone 9 Is determined to be one person.
  • the processing by the personal identification device 6 can be effectively performed for the first time by the identification permission means 60 provided on the controller 100, and the detected retinal pattern and the registered retinal pattern are used. The result of discriminating whether or not there is a match is effectively used in the subsequent processing. If the detected pattern matches the registered pattern and it is determined that the person is qualified to pass through the gate, the second door 92 is automatically opened for a fixed period of time by the entry permission means 920, and the registrant is authorized. Can enter the computer room R. After this entry, the second door 92 is locked again, and the opening from the gate zone 9 side is prevented.
  • the person who enters the room by this series of entry control is the only person who is eligible for gate passage, and can strictly cut unregistered persons and accompanying persons.
  • the second door 92 can be freely opened from the computer room R by operating the touch switch 921, and the exit can be freely performed together with the first door 91. It is a specification that can be done. However, when there is a person in the gate zone 9, an evening lock that disables the operation of the evening switch 9 21 is applied.
  • the person who is qualified to pass through the gate is identified by the personal identification device 6, and when this person enters the room, at the same time, the personal computer of that person can be used by the use permission means 7 provided on the controller 100.
  • a command from the use permission means 7 is input to a switch section 78 provided on the power cable F of the CPU body C, and the switch section 78 turns on the power supply line.
  • the switch section 78 has the same specifications as the switch section 23 interposed in the power cable E of the display D described above, and variations thereof are also considered.
  • the controller 100 is connected to a printer 101 for recording the operating status of the personal identification device 6 and the history of entry, and a keyboard 102 for use in program management and the like.
  • a surveillance camera may be installed inside the gate zone 9 to monitor the entry and exit of people for 24 hours.
  • the one-person detection sensor in the gate zone 9 uses a pressure sensor embedded in the floor, an infrared area sensor installed in the ceiling, a CCD solid-state image sensor, a thermal image sensor, a pulse sensor, etc. Can also be configured.
  • FIG. 4 shows a system in which the operator of the personal computer is managed at the end of use of the personal computer in addition to the system shown in FIG. 3.
  • the first door 91 is opened from the gate zone 9 so that the person can go outside.
  • the personal computer of the exited person which has been clarified by such identification processing at the time of exit, is disabled by a command from the use cutting means 8.
  • a command from the use cutting means 8 is input to the switch section 78 of the power cable F on the CPU main body C side, and the power supply line is turned off by the switch section 78.
  • Fig. 5 shows the screen provided with the screen automatic return means 31.
  • Figs. 7 (A) 1 and (B) 1 after the delay time Ta by the delay means 5 has elapsed (delay time) If there is no step 5 and there is no delay time Ta, after the absence detection by the human sensor 1), if the operator returns to the seat within a certain time Tb measured by the timer Tb, the pass code is input. The screen can be restored without having to do so, and commands can be input by eliminating screen erasure. After the passage of Tb, as shown in Fig. 7 (A) 2 and (B) 2, the screen is allowed to be returned and commands can be input, provided that a formal password is input.
  • the length of D3 is about 1 to 5 seconds (for example, 3 seconds) and Tb is about 10 to 10 seconds (for example, 7 seconds), but it may be arbitrarily determined according to the use environment.
  • the command cut is not linked with the erasure of the display D, but the command is cut by the command cut means 41 and the command is input after the screen automatic return period Tb of the pass address by the screen automatic return means 31. I try to force.
  • the command input is forced only when it is really necessary to secure the security from others. Therefore, there is no waste in control, and efficient security control can be realized.
  • the screen is erased by controlling the signal on the signal line L of the display D, that is, by turning off the analog RGB signal line.
  • the human detection sensor 1 is integrated with the front panel of the CPU main unit C (otherwise, the front frame of the display D can be used). Further, input of a password and setting of each time T a, T b can be performed from the keyboard K.
  • the various means 2 3, 3 1 4, 5, etc. are all constructed in the personal computer P.
  • the analog RGB signal line is turned off, the human sensor 1 is integrated with the CPU, etc., and the password etc. are input from the keyboard K.
  • the specification may be changed.
  • Fig. 9 shows an initial screen that keeps the display on the display D in the dark state when the power is turned on in addition to the one shown in Fig. 5.
  • a power-off prohibiting means 40 for prohibiting power-off by operating the main power switch SW of the personal computer P when the display is erased by the initial screen display means 21 and the screen erasing means 2 to be displayed is provided. In this system, only authorized operators are allowed to actually use the system from the beginning, and unintended power-off can be prevented in conjunction with the screen being erased when the user leaves the desk.
  • FIG. 10 shows an example in which the initial screen dark control means 20 and the initial screen display means 21 similar to FIG. 9 are added to FIG. 6, and the screen automatic of the pass page address is not linked with the deletion of the display D.
  • a power-off prohibiting means 410 for prohibiting power-off after the lapse of the return period Tb is provided. As with the command cut, the power is turned off only when it is really necessary, and there is no waste in control.
  • FIG. 11 shows a configuration corresponding to FIG. 9, but instead of inputting a password in the screen return means 3 and the initial screen display means 21, a personal identification comprising the retinal identification device described in FIG.
  • the device 6 is used to display the display D only when the retina input from the blind window, that is, the finder 61, "turn and registered, turn matching" is obtained.
  • the information unique to the individual called the retinal pattern is used as a control key, so that the information is not stolen by other people like a password, and it is difficult to imitate, so extremely high security can be secured.
  • Fig. 12 shows a configuration corresponding to Fig. 10 and, similarly to Fig. 11, uses a personal identification device 6 consisting of a retinal identification device instead of password input to ensure extremely high security. It is.
  • the above-described series of screen erasure control by the human sensor 1 may be divided into valid / invalid, that is, adopted / non-adopted by an operator's selection.
  • the screen can be turned off by leaving the seat in the daytime when there are many traffic, but the screen can not be turned off in the nighttime overtime hours.
  • the present invention is applied to a desktop personal computer in which the CPU body C and the display D are separated. It is also applicable to types. Industrial applicability
  • the personal computer security system according to the present invention is highly useful in terms of its production from the technical department of the software industry in the personal computer industry, particularly the control engineering department of displays. In terms of information, it is widely useful to various corporate users and individual users involved in information processing.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

L'invention permet d'éliminer facilement toute inquiétude concernant l'éventualité que quelqu'un regarde le contenu affiché sur l'écran d'un ordinateur personnel, que le programme de l'ordinateur soit volé ou qu'une autre personne fasse fonctionner l'ordinateur sans autorisation quand son utilisateur habituel quitte momentanément son siège pour une affaire urgente, etc. Quand l'utilisateur quitte son siège alors qu'il utilise l'ordinateur personnel (P), ses mouvements sont détectés par un capteur à infrarouges (1) et l'image sur laquelle travaille l'utilisateur à l'écran est effacée par déconnexion de la ligne alimentant l'écran (D) ou par commande d'effacement de l'image grâce à une commande, et l'image n'est pas restituée même si une autre personne ne connaissant pas le mot de passe s'assied sur le siège. Quand l'utilisateur revient sur son siège et entre le mot de passe en utilisant dix touches, l'image est restituée et il peut continuer son travail. Il n'est pas nécessaire que l'utilisateur porte une carte d'identité pour des questions de sécurité.
PCT/JP1997/001386 1996-05-07 1997-04-18 Systeme de securite pour ordinateur personnel WO1997042559A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU25776/97A AU2577697A (en) 1996-05-07 1997-04-18 Security system for personal computer
JP9539729A JP3031637B2 (ja) 1996-05-07 1997-04-18 パーソナルコンピュータのセキュリティシステム

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP11223896 1996-05-07
JP8/112238 1996-05-07
JP8/171978 1996-07-02
JP17197896 1996-07-02
JP31465196 1996-11-26
JP8/314651 1996-11-26

Publications (1)

Publication Number Publication Date
WO1997042559A1 true WO1997042559A1 (fr) 1997-11-13

Family

ID=27312210

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP1997/001386 WO1997042559A1 (fr) 1996-05-07 1997-04-18 Systeme de securite pour ordinateur personnel

Country Status (3)

Country Link
AU (1) AU2577697A (fr)
TW (1) TW329507B (fr)
WO (1) WO1997042559A1 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000066758A (ja) * 1998-05-18 2000-03-03 Canon Inc 画像表示装置、携帯機器、機器間通信方法及び記憶媒体
WO2004092934A1 (fr) * 2003-04-17 2004-10-28 Matsushita Electric Industrial Co., Ltd. Dispositif de reduction de temps de demarrage et dispositif electronique
JP2007074115A (ja) * 2005-09-05 2007-03-22 Hitachi Ltd 音声通信端末、メディアサーバおよび音声通信のロック制御方法
JP2009199337A (ja) * 2008-02-21 2009-09-03 Kyocera Mita Corp 印刷システムおよび印刷プログラム
JP2010033531A (ja) * 2008-07-30 2010-02-12 Micro-Star Internatl Co Ltd 電力管理及び安全保護のためのシステム並びにその方法
WO2010101133A1 (fr) * 2009-03-04 2010-09-10 株式会社ナナオ Système d'affichage, contrôleur d'affichage et programme informatique
JP2011210279A (ja) * 2006-01-30 2011-10-20 Dainippon Printing Co Ltd スクリーンロック離席表示システム

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04130908A (ja) * 1990-09-21 1992-05-01 Matsushita Electric Ind Co Ltd 情報処理装置
JPH04199409A (ja) * 1990-11-29 1992-07-20 Matsushita Electric Ind Co Ltd 情報処理装置
JPH052564A (ja) * 1991-06-25 1993-01-08 Oki Electric Ind Co Ltd 端末装置
JPH05216829A (ja) * 1992-01-21 1993-08-27 Nec Corp オンライン画面制御方式
JPH05233896A (ja) * 1992-02-24 1993-09-10 Yuuseidaijin 入退出管理装置
JPH05313772A (ja) * 1992-05-14 1993-11-26 Toshiba Syst Kaihatsu Kk 画面機密保護方式
JPH05313773A (ja) * 1992-05-07 1993-11-26 Oki Electric Ind Co Ltd データ処理装置のセキュリティ方法
JPH07105142A (ja) * 1993-10-06 1995-04-21 Casio Comput Co Ltd 電子機器
JPH07141506A (ja) * 1993-11-17 1995-06-02 Canon Inc 情報処理装置
JPH07271335A (ja) * 1994-03-29 1995-10-20 Nissin Electric Co Ltd 表示装置

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04130908A (ja) * 1990-09-21 1992-05-01 Matsushita Electric Ind Co Ltd 情報処理装置
JPH04199409A (ja) * 1990-11-29 1992-07-20 Matsushita Electric Ind Co Ltd 情報処理装置
JPH052564A (ja) * 1991-06-25 1993-01-08 Oki Electric Ind Co Ltd 端末装置
JPH05216829A (ja) * 1992-01-21 1993-08-27 Nec Corp オンライン画面制御方式
JPH05233896A (ja) * 1992-02-24 1993-09-10 Yuuseidaijin 入退出管理装置
JPH05313773A (ja) * 1992-05-07 1993-11-26 Oki Electric Ind Co Ltd データ処理装置のセキュリティ方法
JPH05313772A (ja) * 1992-05-14 1993-11-26 Toshiba Syst Kaihatsu Kk 画面機密保護方式
JPH07105142A (ja) * 1993-10-06 1995-04-21 Casio Comput Co Ltd 電子機器
JPH07141506A (ja) * 1993-11-17 1995-06-02 Canon Inc 情報処理装置
JPH07271335A (ja) * 1994-03-29 1995-10-20 Nissin Electric Co Ltd 表示装置

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000066758A (ja) * 1998-05-18 2000-03-03 Canon Inc 画像表示装置、携帯機器、機器間通信方法及び記憶媒体
WO2004092934A1 (fr) * 2003-04-17 2004-10-28 Matsushita Electric Industrial Co., Ltd. Dispositif de reduction de temps de demarrage et dispositif electronique
US7257702B2 (en) 2003-04-17 2007-08-14 Matsushita Electric Industrial Co., Ltd. Boot time reducing device including boot preparation instructing unit
JP2007074115A (ja) * 2005-09-05 2007-03-22 Hitachi Ltd 音声通信端末、メディアサーバおよび音声通信のロック制御方法
US7936864B2 (en) 2005-09-05 2011-05-03 Hitachi, Ltd. Voice communication terminal, media server, and method for control of locking voice communication
JP2011210279A (ja) * 2006-01-30 2011-10-20 Dainippon Printing Co Ltd スクリーンロック離席表示システム
JP2009199337A (ja) * 2008-02-21 2009-09-03 Kyocera Mita Corp 印刷システムおよび印刷プログラム
JP2010033531A (ja) * 2008-07-30 2010-02-12 Micro-Star Internatl Co Ltd 電力管理及び安全保護のためのシステム並びにその方法
WO2010101133A1 (fr) * 2009-03-04 2010-09-10 株式会社ナナオ Système d'affichage, contrôleur d'affichage et programme informatique
JP2010205054A (ja) * 2009-03-04 2010-09-16 Nanao Corp 表示システム、表示制御装置及びコンピュータプログラム
JP4615053B2 (ja) * 2009-03-04 2011-01-19 株式会社ナナオ 表示システム、表示制御装置及びコンピュータプログラム

Also Published As

Publication number Publication date
AU2577697A (en) 1997-11-26
TW329507B (en) 1998-04-11

Similar Documents

Publication Publication Date Title
US20100026487A1 (en) Security system control panel
KR100665641B1 (ko) 개인 인증 장치 및 개인 인증 방법
US20060090079A1 (en) Voice authenticated alarm exit and entry interface system
US20070198850A1 (en) Biometric verification and duress detection system and method
CA2640830C (fr) Methode et appareil permettant de faciliter l'utilisation de bruit de fond lors de la fourniture d'acces de securite a de l'equipement
JP3467248B2 (ja) Icカードによるコンピュータ自動認識システム
US7818583B2 (en) Personal authentication apparatus
US20230313595A1 (en) Access control system comprising a sliding door and visualization of status information
WO1997042559A1 (fr) Systeme de securite pour ordinateur personnel
EP3290374B1 (fr) Système d'accès d'ascenseur
CN110388138A (zh) 一种自动提醒用户更换解锁密码的方法、门锁系统及门锁
CN109636957A (zh) 防盗安全门智能控制系统
JP2006331237A (ja) コンピュータのセキュリティシステム
JP3031637B2 (ja) パーソナルコンピュータのセキュリティシステム
EP1946276A1 (fr) Commande d'entrée à système de sécurité
KR100682485B1 (ko) 생체인증 출입통제 시스템 및 그 제어방법
US20070132546A1 (en) Service providing apparatus, service providing program, computer-readable recording medium, service providing method, and key unit
WO2019023964A1 (fr) Système de déverrouillage de terminal intelligent et procédé de déverrouillage
CN110782561B (zh) 触摸面板的防误触控制方法、触摸面板及智能门锁
JP2023540316A (ja) 出入り口扉の開閉制御装置およびシステム
WO2000038118A1 (fr) Dispositif d'entree biometrique pour systeme de securite
US20070290875A1 (en) Interactive wireless interface
KR20110090635A (ko) 도어락 장치 및 그것의 키 관리 방법
JPH11305883A (ja) Crtカットシステム
JP2003030152A (ja) 施設管理システム

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CN JP KR US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: PAT.BUL.49/97 UNDER INID (71) "APPLICANT(FOR ALL DESIGNATED STATES EXCEPT US)",THE APPLICANT S NAMESHOULD READ "IWAMOTO, HIDEJI"

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase