WO2005081197A1 - 情報処理装置および情報処理装置の盗難防止方法 - Google Patents
情報処理装置および情報処理装置の盗難防止方法 Download PDFInfo
- Publication number
- WO2005081197A1 WO2005081197A1 PCT/JP2005/003233 JP2005003233W WO2005081197A1 WO 2005081197 A1 WO2005081197 A1 WO 2005081197A1 JP 2005003233 W JP2005003233 W JP 2005003233W WO 2005081197 A1 WO2005081197 A1 WO 2005081197A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information processing
- alarm
- processing device
- movement detection
- power
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1436—Mechanical actuation by lifting or attempted removal of hand-portable articles with motion detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/14—Mechanical actuation by lifting or attempted removal of hand-portable articles
- G08B13/1409—Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
Definitions
- the present invention relates to an information processing apparatus having an anti-theft function and a method of preventing the information processing apparatus from being stolen.
- Patent Document 1 discloses a small anti-theft device that can be attached to an information processing device.
- This small anti-theft device has a built-in vibration sensor, and determines the presence or absence of take-out based on the vibration cycle and the like. If it is determined that the device has been taken out, a built-in speaker emits an alarm sound, and the sound will continue to be emitted unless authentication is successfully performed using a password known only to the authorized owner.
- Patent Document 2 discloses an information processing device incorporating an anti-theft function. Based on information from a distance sensor, an illuminance sensor, or a gyro sensor built into the information processing device, it is determined whether or not the information is taken out. In the case of no take-out, power-on password authentication and password authentication for encryption / decryption are not required, and the operability of the user is improved.
- Patent Document 3 discloses an information processing apparatus which similarly incorporates an anti-theft function and which can be realized with low power consumption and low cost.
- Information processing equipment The switch located on the bottom detects that the information processing device has been lifted, and issues a warning from a dedicated sound source. The valid holder can stop the alarm by inputting the password for canceling the alarm.
- Patent Literature 1 Japanese Patent Application Laid-Open No. Hei 9-1991
- Patent Document 2 Japanese Patent Application Laid-Open No. 2000-150558776
- Patent Document 3 Japanese Patent Application Laid-Open No. 2002-999347
- the anti-theft device can be attached to various information processing devices.
- the anti-theft device in order to prevent an unauthorized person from easily removing the anti-theft device, the anti-theft device must be installed inside the information processing device, which is inconvenient to install.
- the accessibility to the anti-theft device is poor even when the legitimate holder enters a password to cancel the alarm.
- Patent Documents 2 and 3 incorporate an anti-theft function into the information processing device itself.
- the anti-theft function of an information processing device is required when a valid holder is absent and the main power supply of the information processing device is turned off.
- a function for determining whether the main power switch is turned on, a clock function, and the like are operating.
- the power consumed for these functions is low power, and the power supply system when the main power supply is off is often configured based on this. Therefore, even if the anti-theft function is incorporated in the information processing apparatus itself, the power consumed by the anti-theft function needs to be low power.
- Patent Document 3 discloses that the invention disclosed in Patent Document 2 is disadvantageous in terms of power consumption, and discloses a low power consumption anti-theft function to improve the problem.
- the functions of the information processing apparatus and the anti-theft function are configured as independent functions. For this reason, if an alarm is generated by mistake, the legitimate holder inputs a password for canceling the alarm and cancels the alarm, and enters a power-on password to activate the information processing device.
- Each method was different, and the operability was inconvenient for the rightful owner.
- the information processing device function and the anti-theft function are configured as independent functions, only the anti-theft function is activated when the device is taken out. Only limited theft prevention means, such as an alarm due to the above, can be taken.
- the present invention has been made in view of the above-described circumstances, and has high operability for a legitimate holder and cannot easily release an alarm for an unauthorized person.
- Theft protection method is provided.
- An information processing apparatus has been made to solve the above-described problem.
- a main body an input unit for inputting information, and an input unit
- An information processing section for processing information input from the main body, a movement detection sensor provided in the main body for detecting movement of the main body, and a power supply control section for turning on a main power supply of the main body based on a movement detection signal from the movement detection sensor.
- alarm generating means for generating an alarm when the main power is turned on based on the movement detection signal.
- the method for preventing theft of an information processing device detects the movement of the information processing device with a movement detection sensor, and the movement detection sensor When a movement is detected, a movement detection signal is output, the main power of the information processing device is turned on based on the movement detection signal from the movement detection sensor, and an alarm is issued when the main power-on factor is based on the movement detection signal. Characterized in that it occurs. Brief Description of Drawings
- FIG. 1 is an external view showing an embodiment of an information processing apparatus according to the present invention.
- FIG. 2 is a basic system diagram of the information processing apparatus.
- FIG. 3 is a basic flowchart of the information processing apparatus.
- FIG. 4 is a detailed system diagram of the information processing apparatus.
- FIG. 5 is a flowchart of an alarm generation process.
- FIG. 6 is a flowchart of the authentication process.
- FIG. 7 is a flowchart of a security process.
- FIG. 8 is a diagram showing an example of a main display screen for setting an anti-theft function.
- FIG. 9 is a system diagram showing a second embodiment of the information processing apparatus according to the present invention.
- FIG. 10 is a system diagram showing a third embodiment of the information processing apparatus according to the present invention.
- FIG. 11 is a flowchart of a fourth embodiment of the information processing apparatus according to the present invention.
- FIG. 12 is a system diagram showing a fifth embodiment of the information processing apparatus according to the present invention.
- FIG. 1 is an external view showing an embodiment of the information processing apparatus of the present invention.
- the information processing apparatus 1 includes an information processing unit 2 and a main display 3.
- the information processing device (main body) 1 has an acceleration sensor 8 as a movement detection sensor for detecting the movement of the information processing device 1. Further, as means for generating an alarm when the movement of the information processing device 1 is detected, a built-in speaker 41 is provided.
- a keyboard 102 and a pointing device 103 are provided as an input section 10 for inputting various data.
- a main power switch 7 for starting the information processing device 1 and an auxiliary display 9 are provided on the upper surface of the information processing unit 2.
- the shape and size of the information processing device 1 shown in FIG. 1 or the shape, size and position of each component of the information processing device 1 may take various forms. Further, the information processing apparatus 1 may be configured to use some of the components shown in FIG.
- an information processing unit 2 an input unit 10, and a power control unit 6 are mutually connected via a bus 11.
- the information processing section 2 is connected to a main display 3 for displaying various information and an alarm generating means 4 for generating an alarm.
- the power control unit 6 is connected to the main power switch 7, the acceleration sensor 8, and the auxiliary display 9.
- the input unit 10 is generally composed of a keyboard 102 and a pointing device 103.
- the main display 3 is composed of a liquid crystal display (LCD: LiqidCrysstalDisplay) or the like.
- the information processing device 1 collects information via document creation, spreadsheets, or the Internet. (5) Various information processing such as overnight search can be performed. These functions of the information processing apparatus 1 are functions originally possessed by the information processing apparatus 1, and are hereinafter referred to as basic information processing functions.
- the information processing device 1 is configured as a device to which the anti-theft function of the information processing device 1 is added in addition to the basic information processing function.
- the power control unit 6 of the information processing device 1 is always in operation by power of an internal battery or power externally supplied via an AC adapter, even in a power-off state. Similarly, even in the power-off state, power is supplied to the auxiliary display 9 so that the user can visually check the state of charge of the battery and the presence or absence of external power supply.
- the power consumption of the power control unit 6 and the auxiliary display 9 is sufficiently smaller than the power consumption in the power-on state.
- the information processing device 1 is activated by, for example, pressing down the main power switch 7 by the user.
- the power control unit 6 recognizes that the main power switch 7 has been pressed, and turns on the main power. That is, the power of the battery or the power from the AC adapter is supplied to the components such as the information processing unit 2 and the alarm generation unit 4 and the components of the main display 3. This state is the power-on state.
- BIOS BasicInput / OntputSysteln
- OS Operating System
- an authentication process using a password is performed. That is, the power-on password input from the input unit 10 by the user according to the display on the main display 3 and the power-on password registered by the valid holder in advance in the information processing unit 2 determine whether or not the power-on password matches. This is a process to proceed with the startup sequence only when they match, that is, when the authentication is successful.
- the authentication process in addition to pass-pass authentication, there is also a form of authentication using a token called a token held only by the rightful holder and having a key function that is easy to carry.
- the authentication token include a so-called USB key that can be attached to and detached from a USB (Universal 1 serial bus) connector provided in the information processing device 1, an IC card, a memory card, and the like.
- the valid holder performs authentication by inserting the token into the information processing device 1.
- the data stored in the token and the data stored in the information processing device 1 are determined to match each other, thereby authenticating the user as a valid holder.
- a legitimate holder can register in advance in the information processing apparatus 1 whether or not the authentication is necessary.
- the user If the authentication is successful with a power-on password, etc., the user (authorized holder) can start an application program, for example, a document creation program, under the control of the OS.
- an application program for example, a document creation program
- the above is the schematic sequence of the basic information processing function. If the information processing device 1 is of a stationary type and cannot be easily taken out, authentication processing can prevent unauthorized users from using the information processing device 1.
- the information processing device 1 when the information processing device 1 is a portable type, it is not possible to exclude illegal take-out or theft only by the authentication process. Therefore, the portable information processing device 1 particularly needs an anti-theft function.
- the acceleration sensor 8 is connected to the power control unit 6.
- the acceleration sensor 8 is fixed to the information processing device 1, and detects an acceleration generated due to the movement of the information processing device 1 when the information processing device 1 is moved out.
- the detected acceleration signal can be used as a movement detection signal.
- the acceleration sensor 8 functions as a movement detection sensor, other examples of the movement detection sensor include a gyro sensor and a GPS (GlobalPositioiningSystem).
- the acceleration sensor 8 is energized even in the power-off state similarly to the power supply control unit 6. Therefore, even if the information processing device 1 is in the power-off state, the movement can be detected, and the movement detection signal can be transmitted to the power control unit 6.
- the power control unit 6 determines that the movement has been detected using the movement detection signal from the acceleration sensor 8.
- the power control unit 6 that has detected the movement automatically turns on the main power and starts the startup sequence automatically.
- the information processing device 1 that was in the power-off state is automatically To the power-on state.
- power is supplied to all components of the information processing device 1, such as the information processing unit 2, the alarm generation unit 4, and the main display 3.
- the various functions inherent in the information processing device 1 it is possible to exhibit a highly effective anti-theft function for unauthorized persons. It is possible to invalidate the anti-theft function with a simple operation for the rightful owner.
- FIG. 3 is a basic flowchart showing a basic processing flow of the information processing apparatus 1. The basic processing flow will be described with reference to FIG.
- the power control unit 6 of the information processing device 1 is energized even in the power-off state, and determines whether the anti-theft function setting is set to “valid” (S 1).
- the setting of the anti-theft function can be set to “valid” or “invalid” when the legitimate holder is in the power-on state in advance.
- the setting can be made by the non-volatile memory provided in the power control unit 6. Is stored in the memory.
- the device will be in standby with the power off.
- the power control unit 6 switches the switch 7 Is recognized and the main power is turned on.
- the main power is turned on, power is supplied to the information processing unit 2 and the like of the information processing apparatus 1, and a start sequence is started.
- the acceleration sensor 8 detects an acceleration generated by the movement, and sends an acceleration detection signal to the power control unit 6.
- the power control unit 6 determines movement detection based on the acceleration detection signal. If it is determined that the movement has been detected (yes in S2), the power supply control unit 6 automatically turns on the main power supply and supplies power to the information processing unit 2 and the like.
- the power control unit 6 has information on whether the main power-on factor is based on movement detection or the main power switch 7 is pressed.
- the information processing section 2 inputs this information from the power supply control section 6 via the bus 11 and determines the cause of turning on the main power supply (S5).
- the means for determining the cause of the main power-on is constituted by the power supply control unit 6 and the information processing unit 2. If it is determined that the main power-on factor is based on the movement detection, an alarm generation process (S6) is performed.
- the alarm generation processing (S6) can be generated using an alarm generation means having the built-in speaker 41 of the information processing apparatus 1 as a main component.
- the information processing section 2 performs an alarm release authentication process (S7).
- Various methods can be considered for the alarm release authentication process (S7), but by using the same authentication method as when the basic information processing function is turned on, the operation burden on the legitimate holder can be reduced.
- the power-on authentication method of the basic information processing function is based on the power-on password
- the main display of the information processing apparatus 1 that requires the same password for the alarm release and the power-on password and that requires the input of the password is used. By making the display of the container 3 the same, the operation burden on the legitimate holder can be reduced.
- the alarm can be canceled in a short time when the rightful holder inadvertently moves the information processing apparatus 1 and an alarm is generated as a result.
- Legitimate holders use their password on a daily basis. Therefore, if the alarm canceling password and the password are the same and the input method is the same, the alarm can be canceled in a short time because the method is routinely learned.
- the information processing unit 2 issues an alarm. Release (S9). Thereafter, the setting of the anti-theft function is automatically set to “invalid” in order to avoid another alarm based on the movement by the legitimate holder (S 10). Further, the power-off processing (S11) is automatically performed, and the power-off state is reached.
- the authentication fails, it is regarded as a movement by an unauthorized take-out person, and a standby state is kept with an alarm (S12). Unless the authentication is successful, the alarm will continue until the battery is exhausted. As a result, the unauthorized person can give up the information processing device 1 and prevent theft.
- the basic information processing function can be executed by normal power-on processing. Yes (S13, S14).
- the security setting process is a process to set the anti-theft function to “valid” or “invalid”, and to register or change the power-on password.
- the power-off process (S16) turns the information processing device 1 into the power-off state, but the security setting contents are preserved even in the power-off state.
- the information processing apparatus 1 includes an information processing unit 2, a power control unit 6, and an input unit 10 connected to each other via a bus 11.
- the information processing unit 2 includes a main memory 52, a hard disk drive (HDD) 53, a display control unit 55, a CODEC (CO der DEC oder) 56, and a CPU 51 via a bus signal conversion unit 54. It is configured by being mutually connected to the nonvolatile memory 57.
- the bus signal converter 54 converts the signals between the components so as to be compatible with each other.
- the CPU 51 reads the BIOS stored in the non-volatile memory 57, the OS stored in the HDD 53, or an application program such as a document creation program, and then exchanges them with the main memory 52. Each program is executed while giving and receiving programs and data.
- the display control unit 55 is a part that performs control for displaying data and images on the main display 3 of the information processing device 1.
- COD EC 56 is a function that encodes and decodes signal data according to certain rules, AZD conversion and DZA conversion functions, as well as volume control and mute functions for analog audio circuits (a function to mute the sound). Control. .
- the alarm generation means 4 includes an amplifier 46 for amplifying the signal of the CODEC 56, a volume control unit 43 for adjusting the volume of the amplified signal, a bypass circuit 47 for bypassing the volume control unit 43, and a built-in speaker 4 1 for generating sound.
- the volume control function disabling switch 42 that switches between the volume control unit 43 and the bypass circuit 47, the headphone connection detection unit 44 that detects that a headphone or the like is connected to the information processing device 1, the mute function is disabled It is composed of switches 45 and so on.
- An analog signal (for example, an alarm sound) from the CODEC 56 of the information processing unit 2 is input to the amplifier 46.
- the analog signal amplified by the amplifier 46 disables the volume control function.
- the signal is input to the volume control unit 43 via the switch 42.
- the volume adjuster 43 has a function of adjusting the volume of the built-in speaker 41 by a user operating, for example, a volume adjust dial provided on an external side surface of the information processing device 1.
- the volume control function disable switch 42 is means for disabling the volume control function.
- the volume control function is invalidated. Therefore, even if the user operates the volume control dial of the volume control section 43, the volume of the built-in speaker 41 becomes the volume set in the information processing section 2, and the connection detection section 44 such as a headphone outputs the information.
- the connection detection section 44 such as a headphone outputs the information.
- a mute signal (a signal that reduces the gain of the amplifier 46) is sent to the amplifier 46.
- the sound of the built-in speaker 41 is muted by the mute signal. Therefore, for example, when the user connects the headphone to the information processing apparatus 1, the sound from the built-in speaker 41 disappears, and the sound can be heard only from the headphone.
- the mute function disabling switch 45 is a means for disabling the mute function.
- the switch 45 is set to off under the control of the information processing unit 2, the mute signal is turned off. As a result, even if a headphone or a microphone is connected, the built-in speaker 41 is not muted.
- the input unit 10 includes a keyboard 102 and a pointing device 103.
- the pointing device 103 is, for example, a mouse or a touchpad, and indicates the position of a cursor on the screen of the main display 3 of the information processing device 1.
- FIG. 5 shows details of the alarm generation processing in step 6 (S6) of the basic flowchart shown in FIG.
- the information processing section 2 sets the function of turning off the main power by the main power switch to “invalid” (S61).
- the power control unit 6 informs the information processing unit 2 that the main power switch 7 has been pressed.
- the information processing unit 2 enters the power-off process after this, and eventually powers off To the state. However, if the main power-on factor is due to movement detection, the information processing unit 2 sets the function of turning off the main power by the main power switch to ⁇ disabled '', so that the power The power-on state is maintained without shifting to the OFF processing.
- the means for disabling the function of turning off the main power is realized by the information processing unit 2.
- the information processing section 2 sets the volume control function to “invalid” (S62). Specifically, the volume control function disable switch 42 of the alarm generation means 4 is set on the bypass circuit 47 side. As a result, even if an unauthorized person attempts to lower the volume of the alarm with the volume adjustment dial of the information processing device 1, the volume is set to the volume set in the information processing unit 2, for example, always becomes the maximum volume.
- the information processing section 2 further sets the mute function to “invalid” (S63).
- the mute function In normal use, when a headphone or the like is connected for user's convenience, the built-in speaker 41 is automatically muted by the mute function, but it is powered on based on movement detection In this case, this function is prohibited.
- Step 64 (S64) is a process in which the CODE 56 of the information processing section 2 generates an alarm sound, thereby generating an alarm from the built-in speaker 41.
- FIG. 6 shows a detailed flowchart of the authentication process (S7 in FIG. 3).
- the information processing unit 2 requests a password for authentication of cancellation of the hairpin report (S71).
- the purpose of this pass is to authenticate the alarm release, but by making it the same as the power-on pass, the operability can be improved for the rightful owner.
- the password request is made using the screen of the main display 3 of the information processing device 1. Also in this case, operability can be improved by making the same screen as the normal power-on password request screen that the legal holder has mastered.
- the input of the password (S72) is also performed using the keypad 102 of the information processing device 1, similarly to the input of the power-on password.
- the input password and the password registered in advance are determined to match (S73), and if they match, it is determined that the authentication has succeeded, and if they do not match, it is determined that the authentication has failed (S74, S75).
- FIG. 7 shows a detailed flowchart of the security setting process (S15 in FIG. 3).
- a password is registered, changed, and other settings are made (S151), and a theft prevention function is set (S152).
- auxiliary display 9 for example, LED: L i G t E i t t i n g D i o d e
- auxiliary display 9 for example, LED: L i G t E i t t i n g D i o d e
- the auxiliary display 9 is energized even in the power-off state, and the legitimate holder can visually check the lighting state to check the setting state of the anti-theft function of the information processing device 1. Therefore, when the anti-theft function is set to “valid”, it is possible to prevent a legitimate holder from moving the information processing device 1 and generating an alarm.
- FIG. 8 shows an example of the screen of the main display unit 3 when security is set.
- security related to security can be set on the same screen by registering and changing passwords (passwords that serve as both power-on passwords and passwords for clearing alarms) and setting anti-theft functions.
- the setting operation is simplified.
- FIG. 9 shows a configuration of a second embodiment of the information processing apparatus 1.
- USB UniversalSerialBus
- IC card reader 58 a USB (UniversalSerialBus) connector 59 and an IC card reader 58 are added to the information processing unit 2 in the first embodiment.
- the token authentication includes a form using a USB key 100 and a form using an IC card 101.
- the authentication can be performed by inserting the USB key 100 in which the authentication information of the valid holder is stored in advance into the USB connector 59.
- the USB-1100 is small and easy to carry Therefore, it is managed only by the rightful holder.
- the authentication operation can be performed more easily and quickly than in the case of authentication using a passcode.
- the IC card 101 is a thin type, for example, a memory card or CPU embedded in a blastic card. Authentication is enabled by storing authentication information of a valid holder in a memory in the IC card 101 and inserting it into the IC card reader 58 of the information processing section 2.
- FIG. 9 shows both the authentication using the USB key 100 and the authentication using the IC force 101, but any one of the authentication methods may be used.
- the information processing device 1 can also be used as an anti-theft function for authentication for alarm release. .
- FIG. 10 shows a third embodiment of the information processing apparatus 1.
- the information processing device 1 requiring the anti-theft function is a portable information processing device.
- portable information processing apparatuses use a battery as a power source.
- the battery is usually attached to the information processing device 1 so as to be relatively easily detachable. For this reason, if the unauthorized person removes power from the outside of the information processing device 1 and removes the battery, power is not supplied to the power control unit 6 of the information processing device 1 and May not be able to be detected.
- a main battery 200 and a sub-battery 201 are held as batteries.
- it has a simple buzz report generation means 205 that operates under the control of the power control unit 6.
- the power control unit 6 of the information processing device 1 is configured to be supplied with power from the sub-battery 201.
- the sub-battery 201 can be miniaturized because the power consumption of the power supply control unit 6 is small. Therefore, the sub-battery 201 is fixed inside the information processing device 1 by, for example, screwing so as not to be easily removed.
- the power control unit 6 that operates on the sub-battery 201 can detect the movement, and An alarm can be generated by the simple alarm generating means 205 (for example, a buzzer).
- the simple alarm generating means 205 for example, a buzzer.
- FIG. 11 shows a flowchart of a fourth embodiment of the information processing apparatus 1. The following description focuses on the differences from the basic flowchart of FIG.
- the information processing section 2 determines whether the movement detection flag of the nonvolatile memory 57 of the information processing section 2 is “1” or “0”.
- the movement detection flag is “1” when the main power is turned on based on the movement detection at the time of the previous use and the main power is turned off by means other than the authentication of a valid holder. For example, it is assumed that the main power of the information processing apparatus 1 is turned on when the unauthorized person moves the information processing apparatus, and then the battery is removed and the main power is turned off to release the alarm. In this case, it is “1”.
- step 6 If the movement detection flag is “1” (yes in S100), jump to step 6 and generate an alarm.
- the movement detection flag is “0” (no in S100)
- the movement detection flag remains “1” and the alarm continues to be generated. For example, when the unauthorized person removes the battery in order to cancel the alarm, the alarm goes off, but the movement detection flag in the non-volatile memory 57 remains “1”.
- FIG. 12 is a system diagram showing a fifth embodiment of the information processing apparatus 1. As shown in FIG. 12
- a gyro sensor 300 is provided in place of the acceleration sensor 8 of the first embodiment, and the information processing unit 2 is provided with a wireless LAN 301.
- the gyro sensor 300 has a function of detecting the position information of the information processing device 1.
- the power supply controller 6 of the information processing device 1 determines movement detection based on the position information detected by the gyro sensor 300. For example, when the position of the information processing device 1 has moved by 10 meters or more with respect to the original position, it is determined that the movement has been detected. The process of automatically turning on the main power after the movement is detected is the same as in the first embodiment.
- the power-on state continues.
- the function to turn off the main power is also prohibited. Therefore, the wireless LAN 301 of the information processing unit 2 is in the operating state.
- the present invention by automatically turning on the main power supply of the information processing device 1 by detecting the movement, it is possible to utilize the functions supported by the information processing device 1. It is possible to provide the information processing apparatus 1 having a high anti-theft function for an unauthorized person, and a high operability for a legitimate person.
- the operability is high for a legitimate holder, and the alarm cannot be easily canceled for an unauthorized person. It has the effect of.
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/509,679 US7518510B2 (en) | 2004-02-25 | 2006-08-25 | Information processing apparatus and antitheft method for the apparatus |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-050307 | 2004-02-25 | ||
JP2004050307A JP4744811B2 (ja) | 2004-02-25 | 2004-02-25 | 情報処理装置及びその制御方法 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/509,679 Continuation US7518510B2 (en) | 2004-02-25 | 2006-08-25 | Information processing apparatus and antitheft method for the apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005081197A1 true WO2005081197A1 (ja) | 2005-09-01 |
Family
ID=34879582
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/003233 WO2005081197A1 (ja) | 2004-02-25 | 2005-02-21 | 情報処理装置および情報処理装置の盗難防止方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US7518510B2 (ja) |
JP (1) | JP4744811B2 (ja) |
CN (1) | CN1926590A (ja) |
WO (1) | WO2005081197A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905626A (zh) * | 2012-12-28 | 2014-07-02 | 联芯科技有限公司 | 移动终端及其防盗操作方法 |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7218226B2 (en) | 2004-03-01 | 2007-05-15 | Apple Inc. | Acceleration-based theft detection system for portable electronic devices |
US8370639B2 (en) * | 2005-06-16 | 2013-02-05 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using continuous facial biometrics |
US7624279B2 (en) * | 2005-06-29 | 2009-11-24 | Lenovo Singapore Pte. Ltd. | System and method for secure O.S. boot from password-protected HDD |
CN1963717A (zh) * | 2005-11-09 | 2007-05-16 | 鸿富锦精密工业(深圳)有限公司 | 便携式计算机防盗系统及方法 |
JP2007280249A (ja) * | 2006-04-11 | 2007-10-25 | Matsushita Electric Ind Co Ltd | コンピュータの盗難防止装置 |
JP4173513B2 (ja) * | 2006-06-12 | 2008-10-29 | ヤマザキマザック株式会社 | 機器移設有無検知装置及びその機器移設有無検知装置を備えた機器 |
JP2008059384A (ja) | 2006-08-31 | 2008-03-13 | Toshiba Corp | 情報処理装置および制御方法 |
US9152826B2 (en) * | 2006-10-31 | 2015-10-06 | Hewlett-Packard Development Company, L.P. | Damage detection for an anti-theft interface |
US7796035B2 (en) * | 2006-11-22 | 2010-09-14 | Honeywell International Inc. | Method for setting a programmable allowed movement time on an asset protection device |
DE102007033004A1 (de) * | 2007-07-16 | 2009-01-22 | Robert Bosch Gmbh | Verfahren und Vorrichtung zur Schaltung von elektrischen Geräten |
JP2009146376A (ja) * | 2007-11-22 | 2009-07-02 | Fanuc Ltd | 移設検出機能を備えた数値制御装置 |
JP4945471B2 (ja) * | 2008-02-06 | 2012-06-06 | ファナック株式会社 | 移設防止機能を有する数値制御装置 |
JP5426176B2 (ja) * | 2009-01-09 | 2014-02-26 | ホーチキ株式会社 | アクセスコントロール装置 |
JP5418134B2 (ja) | 2009-10-16 | 2014-02-19 | 富士通株式会社 | 情報端末およびコンピュータプログラム |
JP5531256B2 (ja) * | 2010-04-21 | 2014-06-25 | 株式会社東芝 | 情報処理装置および音声出力制御方法 |
US9171439B2 (en) * | 2011-07-06 | 2015-10-27 | Checkpoint Systems, Inc. | Method and apparatus for powering a security device |
US9519769B2 (en) * | 2012-01-09 | 2016-12-13 | Sensible Vision, Inc. | System and method for disabling secure access to an electronic device using detection of a predetermined device orientation |
JP2013229031A (ja) * | 2013-05-09 | 2013-11-07 | Hochiki Corp | アクセスコントロール装置 |
TWI574175B (zh) * | 2013-06-18 | 2017-03-11 | 緯創資通股份有限公司 | 防盜方法及其電腦系統 |
US9786153B2 (en) | 2014-11-26 | 2017-10-10 | Justin London | Multi-modal tracking locator alarm system |
CN104408387A (zh) * | 2014-12-10 | 2015-03-11 | 成都思邦力克科技有限公司 | 一种防窃取平板电脑 |
CN104463046A (zh) * | 2014-12-10 | 2015-03-25 | 成都思邦力克科技有限公司 | 具有防盗系统的平板电脑 |
WO2016114342A1 (ja) | 2015-01-15 | 2016-07-21 | 日本電気株式会社 | 情報処理装置、制御方法及びプログラム |
US10764064B2 (en) * | 2017-12-01 | 2020-09-01 | International Business Machines Corporation | Non-networked device performing certificate authority functions in support of remote AAA |
US11086989B2 (en) * | 2018-01-02 | 2021-08-10 | Western Digital Technologies, Inc. | Smart device security compromised warning apparatus and method |
DE102018127330A1 (de) * | 2018-11-01 | 2020-05-07 | Infineon Technologies Ag | System-on-Chip und Verfahren zum Betreiben eines System-on-Chip |
US11641708B2 (en) | 2020-08-28 | 2023-05-02 | Abl Ip Holding Llc | Light fixture controllable via dual networks |
JP7254978B1 (ja) | 2022-01-17 | 2023-04-10 | レノボ・シンガポール・プライベート・リミテッド | 情報処理装置、及び制御方法 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS598095A (ja) * | 1982-07-07 | 1984-01-17 | 池田 康夫 | 盗難防止装置 |
JPH0535355A (ja) * | 1991-07-31 | 1993-02-12 | Toshiba Corp | ポータブルコンピユータ |
JP2000099186A (ja) * | 1998-09-25 | 2000-04-07 | Koichi Hasegawa | コンピュータ及びコンピュータ応用機器の盗難防止装置 |
JP2000155876A (ja) * | 1998-11-20 | 2000-06-06 | Nec Corp | 盗難防止装置 |
JP2000172960A (ja) * | 1998-12-04 | 2000-06-23 | Kazumasa Yoshihiro | 携帯用電子機器の盗難防止装置 |
JP2000215374A (ja) * | 1999-01-26 | 2000-08-04 | Hochiki Corp | 盗難防止システム |
JP2002099347A (ja) * | 2000-09-25 | 2002-04-05 | Hitachi Ltd | ノート型パーソナルコンピュータの盗難防止機構 |
JP2002373386A (ja) * | 2001-06-15 | 2002-12-26 | Ekishii:Kk | セキュリティ装置及びその動作方法 |
JP2003112606A (ja) * | 2001-10-05 | 2003-04-15 | Matsushita Electric Ind Co Ltd | 盗難防止装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0535354A (ja) * | 1991-07-31 | 1993-02-12 | Toshiba Corp | ポータブルコンピユータ |
US5406261A (en) * | 1993-01-11 | 1995-04-11 | Glenn; James T. | Computer security apparatus and method |
JP3163242B2 (ja) | 1996-01-18 | 2001-05-08 | 富士通株式会社 | 盗難防止装置及び盗難防止方法 |
US5872515A (en) * | 1996-03-20 | 1999-02-16 | Samsung Electronics Co., Ltd. | Laptop computer with an anti-theft alarm function and a method of controlling the same |
US6037748A (en) * | 1998-06-15 | 2000-03-14 | Motorola, Inc. | Method and apparatus for control of an electronic system using intelligent movement detection |
US6014079A (en) * | 1998-10-20 | 2000-01-11 | Huang; Dennis | Burglar alarm system for an electronic apparatus with a slot |
US6970095B1 (en) * | 1999-05-17 | 2005-11-29 | Caveo Technology, Llc | Theft detection system and method |
JP2002037338A (ja) | 2000-07-25 | 2002-02-06 | Kenwood Corp | 衝撃検知を可能とした梱包構造 |
TW497744U (en) * | 2001-03-05 | 2002-08-01 | De-Shiang Huang | Touching and sensing alarm apparatus |
CA2455719A1 (en) * | 2003-01-24 | 2004-07-24 | Christopher K. Mitchell | Apparatus and methods for protecting valuables |
JP4000085B2 (ja) * | 2003-04-10 | 2007-10-31 | 三菱電機株式会社 | 表示装置 |
-
2004
- 2004-02-25 JP JP2004050307A patent/JP4744811B2/ja not_active Expired - Fee Related
-
2005
- 2005-02-21 CN CNA2005800061201A patent/CN1926590A/zh active Pending
- 2005-02-21 WO PCT/JP2005/003233 patent/WO2005081197A1/ja active Application Filing
-
2006
- 2006-08-25 US US11/509,679 patent/US7518510B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS598095A (ja) * | 1982-07-07 | 1984-01-17 | 池田 康夫 | 盗難防止装置 |
JPH0535355A (ja) * | 1991-07-31 | 1993-02-12 | Toshiba Corp | ポータブルコンピユータ |
JP2000099186A (ja) * | 1998-09-25 | 2000-04-07 | Koichi Hasegawa | コンピュータ及びコンピュータ応用機器の盗難防止装置 |
JP2000155876A (ja) * | 1998-11-20 | 2000-06-06 | Nec Corp | 盗難防止装置 |
JP2000172960A (ja) * | 1998-12-04 | 2000-06-23 | Kazumasa Yoshihiro | 携帯用電子機器の盗難防止装置 |
JP2000215374A (ja) * | 1999-01-26 | 2000-08-04 | Hochiki Corp | 盗難防止システム |
JP2002099347A (ja) * | 2000-09-25 | 2002-04-05 | Hitachi Ltd | ノート型パーソナルコンピュータの盗難防止機構 |
JP2002373386A (ja) * | 2001-06-15 | 2002-12-26 | Ekishii:Kk | セキュリティ装置及びその動作方法 |
JP2003112606A (ja) * | 2001-10-05 | 2003-04-15 | Matsushita Electric Ind Co Ltd | 盗難防止装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905626A (zh) * | 2012-12-28 | 2014-07-02 | 联芯科技有限公司 | 移动终端及其防盗操作方法 |
Also Published As
Publication number | Publication date |
---|---|
JP2005242585A (ja) | 2005-09-08 |
US7518510B2 (en) | 2009-04-14 |
JP4744811B2 (ja) | 2011-08-10 |
CN1926590A (zh) | 2007-03-07 |
US20070040678A1 (en) | 2007-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005081197A1 (ja) | 情報処理装置および情報処理装置の盗難防止方法 | |
JP2005242585A5 (ja) | ||
JP4131229B2 (ja) | 折り畳み式携帯電話機及び折り畳み式携帯電話機のロック解除方法 | |
US8312559B2 (en) | System and method of wireless security authentication | |
WO2002042890A1 (fr) | Systeme de securite pour processeur d'informations | |
WO2008038515A1 (en) | Mobile terminal device, key operation lock method in the mobile terminal device, and program | |
KR101377644B1 (ko) | 스마트 도난 방지 장치 및 이를 구비한 전자기기 | |
JP2006340069A (ja) | 非接触icカード機能付き携帯端末および非接触icカード | |
JP2014110009A (ja) | 携帯端末装置 | |
JP2001092554A (ja) | 情報処理装置 | |
US20190347389A1 (en) | Methods, devices and systems for authenticated access to electronic device in a closed configuration | |
JP5251966B2 (ja) | 携帯端末の認証システムおよび携帯端末 | |
CN106447325B (zh) | 一种基于nfc通信的处理方法、装置及移动终端 | |
KR20020001294A (ko) | 사용자 인식 도난방지/정보보안장치 | |
JP2004259000A (ja) | 情報処理装置 | |
JP2009015377A (ja) | 情報処理装置 | |
JP2002099347A (ja) | ノート型パーソナルコンピュータの盗難防止機構 | |
JP2008048082A (ja) | 携帯電話装置及びプログラム | |
JP4601042B2 (ja) | 携帯端末および電源制御方法 | |
JPH0535355A (ja) | ポータブルコンピユータ | |
JP2011107956A (ja) | コンピュータシステム | |
JP2006086738A (ja) | 移動体、非接触媒体の起動方法、起動プログラム及び記録媒体 | |
JP2007214632A (ja) | 携帯通信端末 | |
US8645705B2 (en) | Information processing device and activation control method | |
JPH05150853A (ja) | ポータブルコンピユータ |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11509679 Country of ref document: US Ref document number: 200580006120.1 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 11509679 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |