WO2006046556A1 - Dispositif electronique ayant un procede de commande de fonction preventive contre le vol et programme de commande - Google Patents

Dispositif electronique ayant un procede de commande de fonction preventive contre le vol et programme de commande Download PDF

Info

Publication number
WO2006046556A1
WO2006046556A1 PCT/JP2005/019595 JP2005019595W WO2006046556A1 WO 2006046556 A1 WO2006046556 A1 WO 2006046556A1 JP 2005019595 W JP2005019595 W JP 2005019595W WO 2006046556 A1 WO2006046556 A1 WO 2006046556A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
operations
unit
theft
order
Prior art date
Application number
PCT/JP2005/019595
Other languages
English (en)
Japanese (ja)
Inventor
Yuji Chotoku
Kouji Kawahara
Takashi Yomo
Original Assignee
International Business Machines Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corporation filed Critical International Business Machines Corporation
Publication of WO2006046556A1 publication Critical patent/WO2006046556A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Definitions

  • the present invention relates to an electronic device for preventing theft, a control method, and a control program.
  • the present invention relates to the release and setting of an anti-theft function.
  • Patent Document 1 Japanese Patent Laid-Open No. 5-35354
  • the alarm action is configured so that only the rightful owner can cancel it, and when the rightful owner releases it, it is required to enter the password.
  • password input causes the user's original operability to deteriorate.
  • Japanese Patent Application Laid-Open No. 2000-155 876 has a case where it is used in a safe place and a case where it is taken out and used.
  • the sensor level is used to automatically switch the security level between the safe place and the safe place, and the access operation to the information terminal and the read operation of the confidential information file are simplified.
  • Patent Document 2 a technique for switching between a key and a strict key
  • Patent Document 1 Japanese Patent Laid-Open No. 5-35354
  • Patent Document 2 JP 2000-155876 A
  • an object of the present invention is to provide an electronic device, a control method, and a control program that can solve the above-described problems.
  • the present invention conceals the function as a word word in the order of performing a plurality of independent operations performed by the user of the electronic device on the electronic device. . That is, the present invention relates to an anti-theft processing unit that performs processing for preventing electronic devices from being stolen, and a database that stores the order in which operations are performed for a plurality of independent operations performed on electronic devices.
  • a multi-operation detection unit that detects a plurality of operations, a determination unit that determines whether the order in which the plurality of operations are detected matches the order in which the operations stored in the database are performed, and the determination unit Then, when it is determined, an electronic device including a non-execution instructing unit that instructs the anti-theft processing unit to not execute the process is provided.
  • the plurality of independent operations performed on the electronic device are a plurality of operations performed by the user using the electronic device, and each operation has a result that is completed by itself. Multiple operations.
  • the electronic device of the present invention further includes an input unit for inputting the order in which the above operations are performed by the user, and the database describes the order in which the operations input from the input unit are performed. You can remember.
  • the electronic device of the present invention further includes a display unit and an automatic registration control unit that displays the order in which the plurality of operations are detected on the display unit for the plurality of operations detected by the plurality of operation detection unit.
  • the database can also store the order in which a plurality of operations displayed on the display unit are detected as the order in which the above operations are performed.
  • the electronic device of the present invention detects a predetermined operation indicating the start of use of the electronic device, and prevents theft in response to detection of the predetermined operation by the start operation detecting unit. It further includes a first restart instruction unit that instructs the processing unit to resume the above process.
  • the predetermined operation indicating the start of use of the electronic device refers to an operation in which it can be determined that the use of the electronic device has been started by the user. More specifically, an operation for opening a lid that can be opened and closed on the main body of the electronic device, an operation for opening an application window, an operation for switching the electronic device to a normal operation mode, a removable device or a cap At least one of an operation of connecting the electronic device to the electronic device and an operation of moving the electronic device in a predetermined manner in accordance with the connecting operation.
  • the electronic device of the present invention determines that the electronic device is in a stationary state based on a state change detection unit that detects a change in the installation state of the electronic device and an output of the state change detection unit. And a second restart instruction unit that instructs the anti-theft processing unit to restart the process.
  • the anti-theft processing unit includes a state change detection unit that detects a change in the installation state of the electronic device, and a warning unit that issues a warning in response to detection of the change in the installation state by the state change detection unit. And forbidden parts prohibiting the use of Z or electronic equipment.
  • the present invention is a method for controlling an anti-theft function for preventing an electronic device from being stolen, and the order in which the operations are performed for a plurality of independent operations performed on the electronic device.
  • the method of the present invention indicates the start of use of the electronic device after the antitheft function is released.
  • the method of the present invention may further include a step of instructing to resume the anti-theft function on condition that the electronic device is determined to be stationary after the anti-theft function is released.
  • the present invention provides a program for controlling an anti-theft function for preventing an electronic device from being stolen for causing a computer to execute the steps of the above method.
  • FIG. 1 is a diagram showing an example of a hardware configuration of a computer system 10 which is an electronic device (hereinafter simply referred to as “device”) to which the present embodiment is applied.
  • the main parts of the anti-theft function and anti-theft release Z setting function are realized under the control of the embedded controller 41 described later.
  • the other parts are realized under the control of the CPU 11 that controls the entire computer system 10.
  • the computer device provided with the computer system 10 is configured as a notebook personal computer (notebook PC) equipped with a predetermined operating system, for example.
  • the notebook PC includes a main body 200 and a lid 201 having a display screen 202 attached to the main body 200 so as to be openable and closable.
  • CPU 11 executes various arithmetic processes under program control to control the entire computer system 10.
  • CPU11 is a system bus FSB (Front Side Bus) 12, PCI (Peripheral Component Interconnect) bus 20 as a high-speed I / O device bus, LPC (Low Pin Count) as a low-speed I / O device bus It is interconnected with each component via a three-stage bus called Nos 40.
  • This CPU 11 stores program code and data in the cache memory to increase processing speed. We are trying to speed up.
  • the FSB 12 and the PCI bus 20 are connected by a CPU bridge (host-one PCI bridge) 15 called a memory / PCI chip.
  • the CPU bridge 15 includes a memory controller function for controlling the access operation to the main memory 16 and a data buffer for absorbing a difference in data transfer speed between the FSB 12 and the PCI bus 20. It has a configuration.
  • the main memory 16 is a writable memory used as a reading area for the execution program of the CPU 11 or a work area for writing processing data of the execution program. For example, it is composed of a plurality of DRAM chips.
  • This execution program includes various dry machines for operating the OS and peripheral devices, and application programs for executing specific tasks.
  • the video subsystem 17 is a subsystem for realizing functions related to image display, and includes a video controller.
  • This video controller processes drawing commands from the CPU 11, writes the processed drawing information into the video memory, and also reads out the drawing information from the video memory and outputs it to the monitor 18 such as a liquid crystal display (LCD) as drawing data. is doing.
  • LCD liquid crystal display
  • the PCI bus 20 is a bus capable of relatively high-speed data transfer. Connected to the PCI bus 20 are an I / O bridge (also referred to as a south bridge or an I / O hub) 21, a card bus controller 22, an audio subsystem 25, a docking station interface (Dock I / F) 28, and the like.
  • I / O bridge also referred to as a south bridge or an I / O hub
  • card bus controller 22
  • an audio subsystem 25
  • docking station interface Dock I / F
  • the I / O bridge 21 is a control circuit having a bridge function between the PCI bus 20 and the LPC bus 40, and includes a DMA controller function, a programmable interrupt controller (PIC) function, and a programmable 'interval' timer (PIT). It has various functions such as a function, IDEOntegrated Device Electronics (Interface) interface function, USB (Universal Serial Bus) function, SMB (System Management Bus) interface function, etc., and has a built-in real-time clock (RTC).
  • PIC programmable interrupt controller
  • PIT programmable 'interval' timer
  • the DMA controller function is used for data transfer between a peripheral device (for example, FDD) and the main memory 16. This is a function to execute data transfer without intervention of CPU11.
  • the PIC function is a function that executes a predetermined program (interrupt handler) in response to an interrupt request (IRQ) from a peripheral device.
  • the PIT function is a function that generates a timer signal at a predetermined period, and the generation period is programmable.
  • the interface realized by the IDE interface function is connected to the CD-ROM drive 33 by ATAPI (AT Attachment Packet Interface).
  • ATAPI AT Attachment Packet Interface
  • another type of IDE device such as a DVD (Digital Versatile Disc) drive may be connected.
  • the I / O bridge 21 is provided with a USB port, and this USB port is connected to a USB connector 30 provided on, for example, the wall surface of the notebook PC body.
  • a USB device (see USB device 31 in FIG. 2) is an example of a removable device according to the present invention, specifically a keyboard, a mouse, a joystick, a scanner, a printer, a modem, a display 'monitor, a tablet. There are various things.
  • the I / O bridge 21 is connected to the power supply circuit 35.
  • This power supply circuit 35 is used in, for example, an AC adapter 36 that is connected to a commercial power supply of AC 100V and performs AC / DC conversion, a battery (secondary battery) 38 that is repeatedly charged and discharged, and a computer system 10 A circuit such as a DC / DC converter (DC / DC) 39 that generates a DC constant voltage is provided.
  • DC / DC DC / DC converter
  • an internal register for managing the power state of the computer system 10 and the management of the power state of the computer system 10 including the operation of the internal register are managed.
  • This logic sends and receives various signals to and from the power supply circuit 35, and recognizes the actual power supply state from the power supply circuit 35 to the computer system 10 by sending and receiving these signals.
  • the power circuit 35 controls the power supply to the computer system 10 in accordance with instructions from this logic.
  • the card bus controller 22 is a dedicated controller for directly connecting the bus signal of the PCI bus 20 to the interface connector (card bus) of the PCI card bus slot 23.
  • the card bus' slot 23 is disposed on the wall surface of the notebook PC main body, for example, and is loaded with a PC card (see PC card device 24 in FIG. 2) which is an example of a removable device according to the present invention. Is done.
  • the audio subsystem 25 is a chip (sound chip) for outputting sound, and produces sound using either an FM sound source or a PCM sound source.
  • the audio subsystem 25 has audio terminals such as a microphone input and a speaker output, and can be connected to a microphone, a headphone, a speaker, etc., which are examples of a removable device according to the present invention. Note that it is preferable to configure the amplifier and the speaker so that power is always supplied even when the computer system 10 is powered off.
  • the docking station interface 28 is hardware for connecting a docking station (not shown) that is a function expansion device when the computer system 10 is a notebook PC.
  • a port replicator may be connected instead of the docking station.
  • the docking station and port replicator are also examples of the removable device according to the present invention.
  • the embedded controller 41, the flash ROM 46, and the Superl / O controller 47 are connected to the LPC bus 40, and the external controller that operates at a relatively low speed like a keyboard / mouse controller is connected. It is also used to connect peripheral devices.
  • the embedded controller 41 controls a keyboard (not shown) and is connected to the power supply circuit 35.
  • the embedded controller 41 is part of the power management function together with the gate array 49 by the built-in power management controller. .
  • the embedded controller 41 has an anti-theft function and an anti-theft function release Z setting function.
  • Each function of the embedded controller 41 is read by the keyboard control program, the power management program, and the anti-theft release Z setting program 60 and the anti-theft program 70, which are described later, into the internal RAM 43. Implemented by the internal CPU.
  • embedded controller 41 includes EEPROM 45.
  • This EEPROM 45 is an example of a database according to the present invention, and stores the order in which operations are performed for a plurality of operations performed on devices.
  • the embedded controller 41 is preferably configured to receive power from the power supply circuit 35 even when the computer system 10 is powered off. In this case, the anti-theft function and anti-theft function release Z setting function may be turned on at all times. It becomes possible.
  • the embedded controller 41 includes a lid opening / closing switch (LID SW50) attached to the notebook PC body so as to be opened and closed, a headphone Z microphone mouthphone, and a docking station Z port. 'Signal lines are connected to indicate the attachment / detachment of the replicator and AC adapter to the computer system 10 (headphoneZmicrophone SW26, Docking SW29, AC adapter SW37). Furthermore, the embedded controller 41 is connected to a sensor 51 that detects a change in the installation state of the computer system 10.
  • LID SW50 lid opening / closing switch
  • 'Signal lines are connected to indicate the attachment / detachment of the replicator and AC adapter to the computer system 10 (headphoneZmicrophone SW26, Docking SW29, AC adapter SW37).
  • the embedded controller 41 is connected to a sensor 51 that detects a change in the installation state of the computer system 10.
  • the change in the installation state of the computer system 10 is specifically expressed as the tilt or swing of the computer system 10 main body.
  • These states are obtained by, for example, an acceleration force detected by an acceleration sensor provided at an appropriate place in the computer system 10.
  • This acceleration includes linear acceleration and angular acceleration.
  • linear acceleration generates static acceleration (gravity acceleration) that varies according to the attitude of the acceleration sensor and forces other than gravity that the computer system 10 receives.
  • static acceleration gravitation acceleration
  • dynamic acceleration as a source.
  • a pressure sensor that detects a change in installation pressure when the computer system 10 main body is lifted can be used.
  • a change in the distance between the computer system 10 and an obstacle around the computer system 10 or a change in brightness around the computer system 10 can be used.
  • a distance sensor or an illuminance sensor that measures distance by transmitting infrared rays or ultrasonic waves and receiving reflected waves from obstacles can be used instead of the acceleration sensor or pressure sensor.
  • an I / O port 48 is connected to the Superl / O controller 47, and parallel data input / output (PIO) via an FDD drive, a parallel port such as a printer, or an external modem, etc. Control serial data input / output (SIO) via the port!
  • a peripheral device connected to the I / O port 48 is also an example of a removable device according to the present invention.
  • the flash ROM 46 is a ROM that can electrically erase data and write new data in batch or block units, and stores a basic input / output system (BIOS). .
  • the programs provided to the embedded controller 41 and the computer system 10 are not only flexible disks and CD-ROMs, but also optical recording media such as DVDs and PDs, and magneto-optical recordings such as MDs. It may be provided by being stored in a recording medium such as a semiconductor memory such as a medium, a tape medium, or an IC card. Further, a storage device such as a node disk or RAM provided in a server system connected to a dedicated communication network or the Internet may be used as a recording medium, and the program may be provided to the computer system 10 via the network.
  • a recording medium such as a semiconductor memory such as a medium, a tape medium, or an IC card.
  • a storage device such as a node disk or RAM provided in a server system connected to a dedicated communication network or the Internet may be used as a recording medium, and the program may be provided to the computer system 10 via the network.
  • the program provided to the computer system 10 is also read out from the recording medium force via the Superl / O controller 53 and / or the I / O bridge 21 and installed in the computer system 10 for execution.
  • the operations that these programs cause the embedded controller 41 or the computer system 10 (CPU 11) to perform are the same as the operations described in FIG. 3 and FIGS.
  • an anti-theft release Z setting program 60 and an anti-theft program 70 operate in the embedded controller 41.
  • an anti-theft release Z setting OS program 100, an anti-theft OS program 110, and an operating system (hereinafter referred to as “OS”) 90 operate in the CPU 11.
  • OS operating system
  • a USB device 31, a PC card device 24, and other devices 52 can be connected to the computer system 10.
  • a filter driver that receives information about the connection status from the USB device 31 via the USB driver 85.
  • the filter driver C88 that receives information about the connection status from the B86 and the PC card 'device 24 via the PC card' driver 87 also operates.
  • driver D89 that returns information on the connection state of the other device 52 also operates.
  • driver A 84 that notifies the hardware controller 41 of the various event notifications from the hardware or the embedded controller 41 via the ACPI BIOS also operates.
  • mail software 120 which is an abrasion program for sending and receiving electronic mail, operates.
  • the CPU 42 in the embedded controller 41 is released from the anti-theft Z.
  • the setting program 60 is read into the RAM 43 and executed, the operation order database 61, the multiple operation detection unit 62, the determination unit 63, the non-execution instruction unit 64, the start operation detection unit 65, the first restart instruction unit 66, and the second
  • Each function of the restart instruction unit 67 is realized in the embedded controller 41.
  • the CPU 11 of the computer system 10 reads the anti-theft release Z setting OS program 100 into the main memory 16 and executes it, the functions of the registration panel 101, registration unit 102, automatic registration control unit 103, and notification unit 104 are activated. This is realized in the computer system 10.
  • the CPU 42 in the embedded controller 41 reads the anti-theft program 70 into the RAM 43 and executes it, the functions of the state change detection unit 71, warning unit 72, and prohibition unit 73 are performed by the embedded controller. Realized within 41. Further, when the CPU 11 of the computer system 10 reads the anti-theft OS program 110 into the main memory 16 and executes it, the warning message 111 and the password prompt 112 are realized in the computer system 10.
  • the anti-theft program 70 is shown as a separate program different from the anti-theft release Z setting program 60.
  • the anti-theft release Z setting program 60 is incorporated into the anti-theft program 70.
  • One program may be used.
  • the anti-theft release Z setting OS program 100 and the anti-theft OS program 110 may be combined into one OS program.
  • configure the anti-theft program 70 and the anti-theft release Z setting program 60 so that the CPU 11 of the computer system 10 reads into the main memory 16 and executes it.
  • the operation order database 61 stores the order in which operations are performed for a plurality of independent operations performed on devices.
  • a plurality of independent operations performed on a device are a plurality of operations performed on a device by a user using the device, and each operation has a result that is completed by itself. Operation. Preferably, it is a plurality of independent operations performed on the device before the device is carried by the user.
  • an operation to close a lid attached to the main body of the device so that it can be opened and closed an operation to close a window displayed on the display screen of the device, and a power saving mode such as a stunning state or a hibernation state.
  • a plurality of operations including at least one of an operation of removing a detachable device or cable and an operation of moving a device in a predetermined manner in accordance with the removal operation may be used, but the operation is not limited thereto.
  • the password function is concealed in the order in which a plurality of independent operations performed on the device are performed. For this reason, if an authorized user of the device stores the order generally expected to do so before carrying the device in the operation order database 61 as a default value of the order in which the operation is performed, the user can use the anti-theft function. It is possible to avoid a decrease in user operability that does not need to be performed with awareness of release. On the other hand, as described below, the user can register the order in which operations are performed via the GUI.
  • the registration panel 101 is a user interface for inputting the order in which operations are performed for a plurality of independent operations performed on a device. Then, the registration unit 102 registers the information input from the registration panel 101 in the operation order database 61. As described above, when registering the operations to be registered by the user via the registration panel 101 and the order thereof in the operation order database 61, the function as a password is further strengthened while avoiding a decrease in operability. Safety can be increased.
  • the registration panel 101 and the registration unit 102 may be collectively regarded as an “input unit”.
  • the automatic registration control unit 103 After receiving the automatic registration request from the user, the automatic registration control unit 103 performs a plurality of operations detected by the multiple operation detection unit 62 (to be described later) together with the detected order on the registration panel 101 (monitor Display in 18). At this time, the automatic registration control unit 103 may display a confirmation button that asks the user for confirmation. When the confirmation button is pressed by the user, the registration unit 102 registers the order in which the operations displayed on the registration panel 101 are performed in the operation order database 61.
  • an update button is further displayed.
  • the automatic registration control unit 103 changes the order in which the displayed operations are performed for the user. You may admit. In this way, when automating the registration of the order in which operations are performed when carrying a device, the user is not aware of the “independent multiple operations performed on the device. By this operation, it becomes possible to register the order in which the operations are performed. For this reason, it is possible to simultaneously achieve further enhancement of the password function and further avoidance of user operability degradation.
  • the multiple operation detection unit 62 detects multiple independent operations performed on the device.
  • the lid LID SW50
  • the lid LID SW50
  • the headphone Z microphone HeadphoneZmicrophone SW26
  • docking station Z port replicator Docking SW29
  • AC adapter AC adapter SW37
  • the notification unit 104 in connection with the attachment / detachment of the USB device 31, first, the notification unit 104 receives an event from the filter one driver B 86. Thereafter, the notification unit 104 also notifies the multiple operation detection unit 62 of the attachment / detachment via the driver A84. Even if the PC card device 24 is attached / detached, the same configuration is obtained.
  • the notification unit 104 polls the other driver D89. When the attachment / detachment is detected, the notification unit 104 notifies the multiple operation detection unit 62 of the attachment / detachment via the driver A84. Examples of such other devices 52 include an external display device connected to the IZO port 48 of FIG.
  • detection of an operation of moving the device in a predetermined manner in accordance with the removal operation is performed based on information received from a sensor 51 such as an acceleration sensor connected to the embedded controller 41.
  • the information received from the sensor 51 is, for example, information indicating that the device is tilted in a specific direction or is shaken in a specific manner.
  • the device user removes a removable device or cable such as an AC adapter in advance in the EEPROM 45 in the embedded controller 41 shown in FIG.
  • the predetermined mode of movement is stored.
  • the multiple operation detection unit 62 compares the output signal with the information read from the EEPROM 45, thereby moving the device in a predetermined manner in accordance with the removal operation. Performs operation detection.
  • detection of the opening / closing operation of the window displayed on the display screen of the monitor 18 is performed by using an application “programming” interface (API 92) provided by the OS 90. That is, the notification unit 104 first receives an event notification of a window opening / closing operation, and then notifies the operation detection unit 62 of the operation via the driver A84.
  • API 92 application “programming” interface
  • the detection of an operation for causing the device to transition to the power saving operation mode is performed, for example, when the multiple operation detection unit 62 receives a notification of a pressing event for a specific key.
  • the power saving mode include standby and hibernation.
  • the user can transition the device from the normal operation mode to the power saving mode by, for example, pressing the Fn key and a specific function 'key before carrying the device.
  • the transition from the power saving mode to the normal operation mode is made, for example, by pressing the power button or the Fn key.
  • the multi-operation detection unit 62 is in the off state (or the power saving state) of the computer system 10 except for the operation notified by the notification unit 104 among the plurality of operations described above. Whether it can be detected or not.
  • the multiple operation detection unit 62 is connected to the power source of the computer system 10. It can be detected regardless of whether or not is in the off state (or power saving state).
  • the determination unit 63 compares the order in which the plurality of operations are detected with respect to the plurality of operations detected by the multiple operation detection unit 62, and the order in which the operations stored in the operation order database 61 are performed, Determine if they match. Details of this comparison processing will be described later in the description of the operation of the embedded controller 41 in the present embodiment.
  • the non-execution instructing unit 64 instructs the anti-theft function to be released when it is determined by the determining unit 63 that they match.
  • the anti-theft function is a function realized by the anti-theft program 70, and the anti-theft program 70 performs processing for preventing the theft of the device. Therefore, an instruction to cancel the anti-theft function is issued by issuing an ineffective instruction to the anti-theft program 70.
  • the anti-theft function is automatically canceled or temporarily released. Therefore, according to the present invention, a legitimate user of a device can avoid a decrease in operability of the user who is not required to perform a special operation to cancel the anti-theft function when carrying the device. . In addition, forgetting to release the anti-theft function is reduced, and the anti-theft function can be fully utilized. Therefore, before proceeding with the description of the anti-theft release Z setting program 60, each function of the anti-theft program 70 and the anti-theft OS program 110 will be described here.
  • the state change detection unit 71 detects a change in the installation state of the device. This detection is performed by receiving the output of a sensor 51 such as an acceleration sensor or a pressure sensor. When using a sensor 51 such as an acceleration sensor, attach it to the main body of the device so that it can be opened and closed! It is necessary to prevent misjudgment that the installation status of the equipment has changed due to operations. Therefore, a predetermined threshold value may be set in advance, and only when the output from the sensor 51 exceeds the predetermined threshold value, it may be determined that the installation state of the device has changed, that is, the device has been carried. When the output from the sensor 51 does not exceed a predetermined threshold, it is assumed that there is no output from the state change detection unit 71.
  • a distance sensor that measures the distance by transmitting infrared rays or ultrasonic waves and receiving reflected waves with obstacles can be used. In this case, it can be determined that the installation state has changed when the distance to the obstacle measured by the distance sensor is greater than a predetermined threshold. Furthermore, an illuminance sensor can be used. In this case, it can be determined that the installation state has changed when the measured illuminance value is smaller than a predetermined threshold value.
  • the warning unit 72 issues a warning in response to detection of a change in the installation state by the state change detection unit 71. Specifically, the warning unit 72 can display the warning message 111 on the screen of the monitor 18.
  • the warning unit 72 can control the mail software 120 or issue a beep sound from the speaker 27.
  • the warning unit 72 can control the mail software 120 or issue a beep sound from the speaker 27.
  • the prohibition unit 73 prohibits the use of the device in response to the detection of the change in the installation state by the state change detection unit 71.
  • the lock function (lock unit 91) of the computer provided by the Microsoft Windows (registered trademark) operating system of Microsoft Corporation, which is an example of OS90, can be used.
  • the password prompt 112 is displayed on the screen of the monitor 18 and the user cannot use the device without entering the correct password.
  • the prohibition unit 73 can also prohibit the use of the device by issuing an instruction to the power supply circuit 35 to stop the power supply to the device. This prevents unauthorized use of information held by the device by a third party even in the event of theft.
  • the processing performed by the anti-theft program 70 and the anti-theft OS program 110 to prevent device theft is to monitor the change in the installation state of the device and monitor the change in the installation state of the device. For example, in response to the detection, a predetermined process such as warning or prohibition of use of the device is performed as an example.
  • the start operation detection unit 65 detects that a predetermined operation indicating the start of use of the device has been performed after the non-execution instruction unit 64 gives an instruction to the anti-theft program 70 to the execution.
  • the predetermined operation indicating the start of use of the device refers to an operation in which it can be determined that the use of the device has been started by the user. Specifically, an operation to open the lid that can be opened and closed on the main body of the device, an operation to open an application window, an operation to return the device to the normal operation mode, a device or cable that can be removed from the device. At least an operation of connecting, and an operation of moving the device in a predetermined manner in accordance with the connecting operation Although it can be one, it is not restricted to the said operation. In addition, the detection of the above operation is almost the same as the detection by the multiple operation detection unit 62.
  • the first restart instruction unit 66 instructs the anti-theft program 70 to resume processing. In this way, if a predetermined operation indicating the start of use of the device is detected after the anti-theft function is canceled, it can be considered that the device has been carried by a legitimate user, so the anti-theft function is disabled. It automatically turns on again. This eliminates the need for the user to consciously set the anti-theft function again.
  • the second restart instruction unit 67 after the non-execution instruction unit 64 gives an instruction to the anti-theft program 70 to the implementation, the device is in a stationary state based on the output of the state change detection unit 71.
  • the anti-theft program 70 is instructed to resume processing on the condition that In this way, if it is determined that the device is stationary after the anti-theft function is released, it can be considered that the device has been carried by a legitimate user. Turn on. This eliminates the need for the user to consciously set the anti-theft function again.
  • the order in which operations are performed is stored in the operation order database 61 based on a plurality of independent operations performed on the device. Specifically, when the user designates a plurality of operations and the order in which the operations are performed from the registration panel 101, the registration unit 102 stores these pieces of information in the operation order database 61. It should be noted that the order generally expected to be operated by such a user before carrying the device may be stored in the operation order database 61 as a default value in advance. When automating the registration of the order in which operations are performed, the operations shown in Fig. 3 are performed.
  • the process is started by clicking a predetermined button on registration panel 101 or the like (specifically, refer to event acquisition start button 131 in FIG. 4 (a)).
  • the multiple operation detection unit 62 stores the detected operation in the noffer (step 101).
  • the automatic registration control unit 103 determines whether the user has pressed the end button (specifically, refer to the event acquisition end button 132 in FIG. 4B) (step 102).
  • the multiple operation detection unit 62 repeats the processing of step 101 until the automatic registration control unit 103 determines that the end button has been pressed, and stores the detected operations in the buffer together with the detected order.
  • Step 102 NO.
  • the automatic registration control unit 103 reads the operation and the order in which the operations were detected by the notifier of the multiple operation detection unit 62, and displays it on the registration panel 101 (monitor 18) in step 103. (Specifically, see event list 133 in Fig. 4 (c)).
  • the automatic registration control unit 103 determines whether or not the change button (specifically, refer to the event order change button 135 in Fig. 4) has been pressed by the user (step 104). In this case, the automatic registration control unit 103 receives the update information (specifically, refer to the position of the slide bar 134 in FIG. 4 (c)) (step 105), and returns to step 103 to update again.
  • the order in which the information is reflected is displayed on the registration panel 101 (monitor 18) (specifically, refer to the event list 133 in Fig. 4 (d)). Determines the force with which the user presses the confirmation button (specifically, refer to the event sequence registration button 136 in Fig. 4 (c)) (step 106).
  • registration unit 102 The order in which the operations displayed on the registration panel 101 (monitor 18) are performed is registered in the operation order database 61 (step 107), and the process ends.
  • the embedded controller 41 After the information is registered in the operation sequence database 61 in this way, the embedded controller 41 performs an operation performed by the antitheft cancellation Z setting program 60 shown in FIG.
  • determination unit 63 retrieves registered operations from operation sequence database 61 in the order in which the operations are performed, and stores them in the noffer (step 201). At this time, the determination unit 63 sets the first operation to be performed as the current operation.
  • the comparison process described below each time an operation is detected by the multiple operation detector 62, the operation is compared with the corresponding current operation in the buffer. If they match as a result of the comparison, the next operation in the notifier is set as the current operation. The comparison process is repeated for the number of operations in the buffer. However, if there is a case where the results do not match during the comparison, the first operation in the buffer is set as the current operation, and the comparison process is restarted from the beginning. Therefore, when the comparison processing is continuously matched for all operations in the notifier, the detected order of the plurality of detected operations is stored in the operation order database 61. It matches the order.
  • the determination unit 63 waits for notification of operation detection from the multiple operation detection unit 62.
  • the determination unit 63 next compares the current operation with the operation detected by the multiple operation detection unit 62 to determine whether or not they match ( Step 203).
  • the judging section 63 sets the first operation in the notfer as the current operation again (step 204), and returns to step 202.
  • the determination unit 63 further determines whether or not the current operation is the first operation in the buffer (step 205).
  • step 205 determination unit 63 sets a timer (step 206). This timer setting requires that the operations performed on the device by the user before carrying the device are completed within a certain period of time. As a result, it is possible to avoid malfunctions due to accidental matching of the operation order. If NO in step 205, the determination unit 63 determines whether or not the operation force stored as the last operation to be performed in the current operation force S buffer (step 207).
  • step 207 determination unit 63 retrieves the next operation to be performed by the notifier, sets this as the current operation (step 208), and returns to step 202. On the other hand, in the case of YES at step 207, the determination unit 63 further determines whether or not the time-out has occurred (step 209). If YES is determined, the determination unit 63 sets the first operation in the koffa as the current operation again (step 210). Then, the process returns to step 202, and the comparison process is restarted from the beginning.
  • the determination unit 63 is the result that the order in which the plurality of operations are detected matches the order in which the operations stored in the operation order database 61 are performed.
  • the non-execution instruction unit 64 and the non-execution instruction unit 64 The non-execution of processing is instructed (step 211), and the processing is terminated.
  • the judgment unit 63 stores, in the buffer, as follows: 1. Close the lid, 2. Remove the mouse, 3. Remove the AC adapter. It is assumed that “Close” is set. At this time, in order to carry the device by a legitimate user, it is assumed that the lid is first closed, then the mouse is removed, and finally the AC adapter is removed.
  • step 202 an operation of closing the lid is detected (step 202) and compared with the current operation (step 203). Since they match, it is next determined whether it is the first operation (step 205), and since it is the first operation, a timer is set (step 206). Next, it is determined whether it is the last operation (step 207). Here, since it is NO, the process proceeds to step 208, and the next operation in the buffer, “Remove mouse”, is set as the current operation.
  • step 202 an operation for removing the mouse is detected.
  • step 202 the same processing (except for step 206) as in the case of detecting the closing operation of the lid is performed (step 202 ⁇ step 203 ⁇ step 205 ⁇ step 207 ⁇ step 208).
  • step 208 the next operation in the buffer, “Remove AC Adapter”, is set as the current operation.
  • step 202 an operation of removing the AC adapter is detected.
  • the same processing as that for detecting the closing operation of the lid (except for step 206) is performed (step 202 ⁇ step 203 ⁇ step 205 ⁇ step 207).
  • step 207 since the determination in step 207 is YES this time, the occurrence of a timeout is next determined (step 209) . If the above series of operations is detected within the predetermined time, the process proceeds to step 211, where theft The prevention function is released.
  • step 202 the first operation to close the lid is detected (step 202), and until the next operation in the buffer, “Remove mouse” is set as the current operation in step 208, the above-mentioned valid user is selected. It is the same as the case of. But this time In step 202 for the second time, an operation to remove the AC adapter is detected. For this reason, the result of the determination in step 203 is NO. As a result, in step 204, “close lid”, which is the first operation in the buffer, is set as the current operation, and the comparison process is restarted from the beginning.
  • step 202 an operation of removing the mouse is detected, and in step 203, the current operation is compared with “close lid”. However, since the judgment result is NO, the current operation is not updated. In step 202, operation detection is awaited. As a result, the anti-theft function remains on, and the anti-theft function works effectively when a third party tries to carry the device.
  • the anti-theft program 70 executes a process for preventing the device from being stolen.
  • the operation of the anti-theft function implemented by the anti-theft program 70 and the anti-theft OS program 110 is shown in FIG.
  • state change detector 71 detects a change in the installation state of the device based on the output from sensor 51 (step 301). Then, the warning unit 72 starts generating a warning in response to detection of a change in the installation state of the device by the state change detection unit 71 (step 3002).
  • the warning may include the following.
  • the volume is set to the maximum and a warning sound is output from the speaker 27.
  • the flashing warning message 111 may be displayed on the monitor 18 after the monitor's off function is effective.
  • the warning unit 72 may instruct the mail software 120 to send a warning message to a predetermined destination.
  • the prohibition unit 73 responds to the detection of the change in the installation state of the device by the state change detection unit 71, and Processing to prohibit use may be executed (step 303).
  • a method of prohibiting the use of the device as described above, there is a method of using a computer lock function provided by the Microsoft Windows (registered trademark) operating system as an example of OS90.
  • a method of issuing a command to stop power supply to the device to the power supply circuit 35 may be used.
  • password password Prompts you to enter your password.
  • the non-execution instructing unit 64 may completely cancel the anti-theft function.
  • the non-execution instructing unit 64 issues an instruction to the anti-theft program 70 to temporarily turn off the anti-theft function. That is, in order to return the anti-theft function to the on state by the first restart instruction unit 66 and Z or the second restart instruction unit 67 described later with reference to FIGS. Transition to a temporary release state. In this case, the user does not need to consciously turn on the anti-theft function again, and the user's operability can be prevented from being lowered.
  • the start operation detecting unit 65 starts using the device. Is detected (step 401). Then, in response to the detection of the predetermined operation by the start operation detection unit 65, the first resumption instruction unit 66 instructs the antitheft program 70 to resume the process (step 402). Then, the process ends.
  • the non-operation instruction unit 64 temporarily cancels the anti-theft function based on the determination result of the determination unit 63, and as a result, a legitimate user carries the device. Even if it is possible to do so, if a predetermined operation indicating the start of use of the device is detected, it can be considered that the device has been carried by a legitimate user. This is because it is preferable to restart the process.
  • the process shown in FIG. 8 may be executed. That is, after the non-execution instructing unit 64 makes a transition to the temporary release state in step 211 of FIG. 5, the second restart instructing unit 67 sets the timer and sets the flag to 0. (Step 501).
  • the initialization of the timer and the flag is due to the following reason. That is, when there is no output from the state change detection unit 71 for a certain fixed period, it can be determined that the device is stationary. Therefore, here, a timer is set and the predetermined period is measured. In addition, if there is an output from the state change detection unit 71 even once for the predetermined period, it should be determined that the user of the device is still moving. Therefore, the state change detection unit 7 If there is an output from 1, set the flag to 1 and check this when a timeout occurs.
  • the second restart instruction unit 67 waits for notification from the occurrence of timeout or the state change detection unit 71.
  • the second restart instruction unit 67 sets the flag to 1. (Step 504).
  • second restart instruction section 67 determines whether a timeout has occurred (step 505).
  • step 505 the second restart instruction unit 67 further reads the flag and determines whether or not the value is set to 1 (step 506). If YES here, the second restart instruction section 67 resets the timer (step 507) and returns to step 502. On the other hand, if NO in step 506, the second restart instruction unit 67 determines that the device is in a stationary state, and instructs the anti-theft program 70 to restart the process (step 508). Then, the process ends.
  • the non-operation instruction unit 64 temporarily cancels the anti-theft function based on the determination result of the determination unit 63, and as a result, a legitimate user carries the device. Even if the device can be used, if it is determined that the device has been stationary for a predetermined period of time, it can be considered that the device has been carried by a legitimate user. This is because it is preferable to resume the process.
  • FIG. 1 is a diagram showing a hardware configuration of a computer system to which the present invention is applied.
  • FIG. 2 is a block diagram showing a functional configuration of the computer system in the present embodiment.
  • FIG. 3 is a flowchart showing an example of a process for registering in a database the order in which operations are performed according to operations performed by a user on a device.
  • FIG. 4 is a diagram showing an example of a registration panel for registering in the database the order in which operations are performed by the user on the device.
  • ⁇ 5 It is a flowchart showing an example of anti-theft release processing in the present embodiment.
  • ⁇ 6 This is a flowchart showing an example of operations performed as the anti-theft function in the present embodiment.
  • ⁇ 7 This is a flowchart showing an example of processing executed after canceling the anti-theft function.
  • FIG. 9 is a diagram showing an example of a computer device to which the present invention is applied.
  • Lock part, 92--API, 100 Anti-theft release / setting OS program, 101 ... Registration panel, 102 ... Registration part, 103 ... Automatic registration control part , 104... Intellectual part, 110 ... theft prevention OS for the program, 111, "warning message, 112 ... password prompt, 120 ... Mae Noresofuto

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A propos de l’annulation et/ou du réglage d’une fonction préventive contre le vol, la dégradation de l’efficacité opérationnelle de l’utilisateur est évitée. La présente invention concerne un dispositif électronique comprenant une section de prévention contre le vol pour effectuer un traitement afin d’éviter le vol du dispositif électronique, une base de données où l’ordre d’opérations mutuellement indépendantes du dispositif électronique est stocké, une section de détection d’opérations multiples pour détecter une pluralité d’opérations, une section d’évaluation pour évaluer si l’ordre de détection des opérations concorde ou non avec l’ordre dans lequel les opérations stockées dans la base de données sont effectuées, et une section d’instruction de non performance pour donner instruction à une section de prévention contre le vol d’effectuer un traitement, si la section d’évaluation évalue qu’ils concordent.
PCT/JP2005/019595 2004-10-27 2005-10-25 Dispositif electronique ayant un procede de commande de fonction preventive contre le vol et programme de commande WO2006046556A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004-312553 2004-10-27
JP2004312553 2004-10-27

Publications (1)

Publication Number Publication Date
WO2006046556A1 true WO2006046556A1 (fr) 2006-05-04

Family

ID=36227796

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2005/019595 WO2006046556A1 (fr) 2004-10-27 2005-10-25 Dispositif electronique ayant un procede de commande de fonction preventive contre le vol et programme de commande

Country Status (2)

Country Link
TW (1) TW200632796A (fr)
WO (1) WO2006046556A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010182152A (ja) * 2009-02-06 2010-08-19 Sky Co Ltd 外部記憶媒体管理システム及び外部記憶媒体管理プログラム
JP2010231500A (ja) * 2009-03-27 2010-10-14 Sky Co Ltd 外部記憶媒体管理システム及び外部記憶媒体管理プログラム
CN115457718A (zh) * 2022-09-15 2022-12-09 国网安徽省电力有限公司颍上县供电公司 一种基于智能传感的运行前电缆专用防盗警报系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05182085A (ja) * 1991-12-27 1993-07-23 Secom Co Ltd 盗難防止システム
JPH0747926A (ja) * 1993-08-09 1995-02-21 Tokai Rika Co Ltd 車両のセキュリティシステム
JPH10250400A (ja) * 1997-03-10 1998-09-22 Toyota Motor Corp コラム式シフト装置
JP2001067518A (ja) * 1999-08-30 2001-03-16 Oki Electric Ind Co Ltd 紙幣収納装置
JP2002008168A (ja) * 2000-06-26 2002-01-11 Aiphone Co Ltd インターホン装置
JP2002316590A (ja) * 2001-04-23 2002-10-29 Fujitsu Ten Ltd セキュリティ機能付車載電子機器
JP2004201796A (ja) * 2002-12-24 2004-07-22 Olympia:Kk 遊技機及び遊技機における不正行為防止方法並びにプログラム

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05182085A (ja) * 1991-12-27 1993-07-23 Secom Co Ltd 盗難防止システム
JPH0747926A (ja) * 1993-08-09 1995-02-21 Tokai Rika Co Ltd 車両のセキュリティシステム
JPH10250400A (ja) * 1997-03-10 1998-09-22 Toyota Motor Corp コラム式シフト装置
JP2001067518A (ja) * 1999-08-30 2001-03-16 Oki Electric Ind Co Ltd 紙幣収納装置
JP2002008168A (ja) * 2000-06-26 2002-01-11 Aiphone Co Ltd インターホン装置
JP2002316590A (ja) * 2001-04-23 2002-10-29 Fujitsu Ten Ltd セキュリティ機能付車載電子機器
JP2004201796A (ja) * 2002-12-24 2004-07-22 Olympia:Kk 遊技機及び遊技機における不正行為防止方法並びにプログラム

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010182152A (ja) * 2009-02-06 2010-08-19 Sky Co Ltd 外部記憶媒体管理システム及び外部記憶媒体管理プログラム
JP2010231500A (ja) * 2009-03-27 2010-10-14 Sky Co Ltd 外部記憶媒体管理システム及び外部記憶媒体管理プログラム
CN115457718A (zh) * 2022-09-15 2022-12-09 国网安徽省电力有限公司颍上县供电公司 一种基于智能传感的运行前电缆专用防盗警报系统

Also Published As

Publication number Publication date
TW200632796A (en) 2006-09-16

Similar Documents

Publication Publication Date Title
US5850559A (en) Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low energy consumption mode
US7480813B2 (en) Portable electronic apparatus having a transfer mode for stopping an operating state of a device
US5648762A (en) Built-in electronic apparatus and device-detaching method therefor
US6523125B1 (en) System and method for providing a hibernation mode in an information handling system
CN101675417B (zh) 防篡改控制的系统和方法
JPH1083371A (ja) コンピュータ上のモジュールの自動ロックシステムおよびその方法
US7620830B2 (en) Halt state for protection of hard disk drives in a mobile computing environment
JP2001229117A (ja) 拡張ユニットの制御方法、コンピュータ、記録媒体及び伝送媒体
JPH11345207A (ja) コンピュータシステムおよびその制御方法
JP2007172413A (ja) 電子機器システム、およびロック装置
US6609207B1 (en) Data processing system and method for securing a docking station and its portable PC
US20080163360A1 (en) Information processing appartaus
JPH11353266A (ja) コンピュータシステムおよび同システムの状態制御方法
US7178167B1 (en) Method for preventing unauthorized access to information equipment
US20050289359A1 (en) Preventing the removal of removable devices
JP4764454B2 (ja) ペン入力型情報処理装置、その警告方法、およびコンピュータが実行可能なプログラム
WO2006046556A1 (fr) Dispositif electronique ayant un procede de commande de fonction preventive contre le vol et programme de commande
JPH10143443A (ja) コンピュータシステムおよび同システムにおけるハードディスクパスワード制御方法
US8959255B2 (en) Computer protection system and method
US20040133715A1 (en) Method, apparatus and program for user-determined operational state of a portable computer prior to detachment
JPH11345205A (ja) コンピュータシステムおよびそのウェイクアップ制御方法
JPH11345043A (ja) コンピュータシステムおよびロック制御方法
JPH0535355A (ja) ポータブルコンピユータ
JP2002041176A (ja) コンピュータの管理方法、情報機器、コンピュータおよび記憶媒体
EP4035591A1 (fr) Appareil de traitement d'informations et procédé de commande

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV LY MD MG MK MN MW MX MZ NA NG NO NZ OM PG PH PL PT RO RU SC SD SG SK SL SM SY TJ TM TN TR TT TZ UG US UZ VC VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SZ TZ UG ZM ZW AM AZ BY KG MD RU TJ TM AT BE BG CH CY DE DK EE ES FI FR GB GR HU IE IS IT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW MR NE SN TD TG

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 05799384

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP