[go: up one dir, main page]

CN1647009A - 移动电子设备的防盗 - Google Patents

移动电子设备的防盗 Download PDF

Info

Publication number
CN1647009A
CN1647009A CN 03808595 CN03808595A CN1647009A CN 1647009 A CN1647009 A CN 1647009A CN 03808595 CN03808595 CN 03808595 CN 03808595 A CN03808595 A CN 03808595A CN 1647009 A CN1647009 A CN 1647009A
Authority
CN
China
Prior art keywords
mobile electronic
theft device
password
equipment
electronic devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 03808595
Other languages
English (en)
Other versions
CN100445922C (zh
Inventor
R·兰托
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Technology Solutions GmbH
Original Assignee
Fujitsu Technology Solutions GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Technology Solutions GmbH filed Critical Fujitsu Technology Solutions GmbH
Publication of CN1647009A publication Critical patent/CN1647009A/zh
Application granted granted Critical
Publication of CN100445922C publication Critical patent/CN100445922C/zh
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Burglar Alarm Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Power Sources (AREA)
  • Alarm Systems (AREA)
  • Telephone Function (AREA)

Abstract

本发明涉及在口令检索与定时装置结合应用的情况下用于电子设备、特别是像移动个人计算机或PDA的移动设备的防盗装置。

Description

移动电子设备的防盗
本发明涉及在口令检索与定时装置结合应用的情况下用于电子设备、特别是如移动个人计算机或PDA的移动设备的防盗。
在教育机构中数据处理的电子设备暂时租给举办教育活动的用户。对此采用目前简单的口令保护用于防盗。如果借方没有故意把电子设备与口令一起转交给第三者,则该口令对相应的用户是已知的并且该口令当然仅仅用作防盗。
本发明基于以下技术问题,超越简单的口令保护,预先规定一个口令保护,即使通过借方告知简单口令保护的口令,则该口令保护也仍然起作用。
由此解决该技术问题,即在经过预定时间之后禁止设备运行并且仅仅输入口令该设备才能再度正常运行,通过输入正确的口令复位定时装置。
建议一个用于移动电子设备的防盗装置,其超越简单的口令保护设置一个定时装置,该定时装置在经过确定时间之后禁止该设备,仅仅通过已知定时装置的口令的人员才能重新激活被禁止的设备。在通常情况下该人员不是借方本身而是教育机构的代表。
教育机构的代表配置定时单元并且以口令字保护。如果达到限定的时间,则由于禁止而使设备不能运行并且用户或者借方不能再使用该设备。为了开启必须把该设备送交教育机构的代表。
用于移动电子设备的防盗装置可以有益地集成在设备的不同区域。对此建议:
1.定时装置集成在设备自己的BIOS内,
2.定时装置集成在设备自己的电源内,
3.定时装置集成在设备的操作系统内。
下面根据在附图中示出的实施例描述本发明。唯一的图指出了用于移动电子设备的防盗装置的方框图。
对此在时刻T=0启动用于移动电子设备的防盗装置,在该时刻已经过了定时装置的时间T并且禁止该设备。为了再激活该设备必须输入口令,在使用错误口令的情况下设备保持禁止,直到输入正确的口令。
如果输入正确的口令则释放设备,定时装置的计时器再度被置零。
通过根据本发明的定时装置该设备不关心借用者非法出售或故意转交给第三者的情况。此外在定期呈送设备时在教育机构授权的情况下可以更新设备的软件和硬件。

Claims (8)

1.在应用定时装置的情况下用于移动电子设备的防盗装置,其特征在于,在经过限定时间之后,禁止设备的运行,只有通过输入口令该设备才能重新恢复正常运行并且通过输入正确的口令复位定时装置。
2.按照权利要求1的用于移动电子设备的防盗装置,其特征在于,定时装置集成在设备的BIOS内。
3.按照权利要求1的用于移动电子设备的防盗装置,其特征在于,定时装置集成在设备的电源内。
4.按照权利要求1的用于移动电子设备的防盗装置,其特征在于,定时装置集成在设备的操作系统软件内。
5.按照上述权利要求之一的用于移动电子设备的防盗装置,其特征在于,只有在释放设备并且了解旧口令的情况下可以修改口令以便再度激活设备并且复位定时装置。
6.按照上述权利要求之一的用于移动电子设备的防盗装置,其特征在于,在错误输入预定数目的口令之后激活另一个定时装置,其在限定时间内禁止设备和口令检索。
7.按照上述权利要求之一的用于移动电子设备的防盗装置,其特征在于,采用设备的运行时间作为所述限定时间。
8.按照上述权利要求1至6的用于移动电子设备的防盗装置,其特征在于,采用确定时区的日期和时间作为所述限定时间。
CNB03808595XA 2002-04-19 2003-03-13 移动电子设备的防盗方法 Expired - Fee Related CN100445922C (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE2002117582 DE10217582A1 (de) 2002-04-19 2002-04-19 Diebstahlschutz für mobile elektronische Geräte
DE10217582.9 2002-04-19

Publications (2)

Publication Number Publication Date
CN1647009A true CN1647009A (zh) 2005-07-27
CN100445922C CN100445922C (zh) 2008-12-24

Family

ID=28798602

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB03808595XA Expired - Fee Related CN100445922C (zh) 2002-04-19 2003-03-13 移动电子设备的防盗方法

Country Status (5)

Country Link
EP (1) EP1497706A2 (zh)
CN (1) CN100445922C (zh)
AU (1) AU2003221600A1 (zh)
DE (1) DE10217582A1 (zh)
WO (1) WO2003090043A2 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8296554B2 (en) * 2008-12-30 2012-10-23 Intel Corporation Pre-boot recovery of a locked computer system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5699514A (en) * 1995-12-26 1997-12-16 Lucent Technologies Inc. Access control system with lockout
US5892906A (en) * 1996-07-19 1999-04-06 Chou; Wayne W. Apparatus and method for preventing theft of computer devices
US6014746A (en) * 1997-02-21 2000-01-11 Lockheed Martin Energy Research Corporation Workstation lock and alarm system
US6418533B2 (en) * 1997-08-29 2002-07-09 Compaq Information Technologies Group, L.P. “J” system for securing a portable computer which optionally requires an entry of an invalid power on password (POP), by forcing an entry of a valid POP
AU728317B3 (en) * 2000-06-15 2001-01-04 Alan Robert Richards A rental appliance hiring system
CN1177277C (zh) * 2002-03-29 2004-11-24 风之谷科技有限公司 电脑使用时间管控方法

Also Published As

Publication number Publication date
EP1497706A2 (de) 2005-01-19
CN100445922C (zh) 2008-12-24
DE10217582A1 (de) 2003-11-06
WO2003090043A3 (de) 2004-04-22
AU2003221600A1 (en) 2003-11-03
WO2003090043A2 (de) 2003-10-30

Similar Documents

Publication Publication Date Title
US7797547B2 (en) Information processing apparatus and method of controlling authentication process
TW408268B (en) Remote security technology
CN101276312B (zh) 存储装置
US7930527B2 (en) Information processing apparatus and time and date information change method
WO2005062792A2 (en) Rights management system
WO2005104426A3 (en) Geographic location based licensing system
US5259029A (en) Decoding device for computer software protection
KR101038567B1 (ko) 시스템 응급 복구 장치 및 방법
TW200842582A (en) Methods and systems to selectively scrub a system memory
WO2002095550A3 (en) A security device useful for physically securing digital data storage media, and a method of use thereof
US8721738B1 (en) System and method for ensuring security of data stored on data storage devices
US20070030257A1 (en) Locking digital pen
US8528105B1 (en) System and method for ensuring security of data stored on electronic computing devices
US8984653B2 (en) Client controlled lock for electronic devices
TW466388B (en) Method and apparatus for an integrated security device providing for automatic disablement
JP2000259276A (ja) パスワード制御装置
CN1647009A (zh) 移动电子设备的防盗
JP4069604B2 (ja) セキュリティ管理システムおよびプログラム
WO2005109737A2 (en) Theft deterrence method and system
US6948075B2 (en) Computer controlling method, information apparatus, computer, and storage medium
CN109376511A (zh) 提高终端信息安全的方法
JPH09305249A (ja) 情報処理装置および電子機器の情報処理装置への装着方法
JP2001306266A (ja) ハードディスクのデータ保護方法及びコンピュータシステム
US20060282902A1 (en) Security device and method for information processing apparatus
CN106127058A (zh) 一种提高智能自动化设备安全性的方法

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20081224

Termination date: 20130313