[go: up one dir, main page]

WO2000041058A1 - Computer system having a security device - Google Patents

Computer system having a security device Download PDF

Info

Publication number
WO2000041058A1
WO2000041058A1 PCT/KR1999/000772 KR9900772W WO0041058A1 WO 2000041058 A1 WO2000041058 A1 WO 2000041058A1 KR 9900772 W KR9900772 W KR 9900772W WO 0041058 A1 WO0041058 A1 WO 0041058A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
key
damage
disassembly
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR1999/000772
Other languages
French (fr)
Inventor
Won-Woong Lee
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEESAN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
HEESAN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HEESAN INFORMATION TECHNOLOGY Co Ltd filed Critical HEESAN INFORMATION TECHNOLOGY Co Ltd
Publication of WO2000041058A1 publication Critical patent/WO2000041058A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1615Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function
    • G06F1/1616Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function with folding flat displays, e.g. laptop computers or notebooks having a clamshell configuration, with body parts pivoting to an open position around an axis parallel to the plane they define in closed position
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1633Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
    • G06F1/1656Details related to functional adaptations of the enclosure, e.g. to provide protection against EMI, shock, water, or to host detachable peripherals like a mouse or removable expansions units like PCMCIA cards, or to provide access to internal components for maintenance or to removable storage supports like CDs or DVDs, or to mechanically mount accessories
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1633Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
    • G06F1/1684Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the present invention relates to a computer system, and more particularly, to a computer system having a security device in which a power is not applied without a key so as to thereby prevent usage of the computer like a notebook computer or a laptop computer when lost.
  • the present invention concerns a computer system having a safety device which prevents data stored in a hard disk drive (HDD) of a computer from being read by other person.
  • HDD hard disk drive
  • an output device may be used to print the data onto sheets of paper, or hard disks, CD-ROMs, floppy disks, or other data storing media may be used.
  • the computer system disclosed in WO Publication No 90/05418 includes a central processing unit (CPU) , a main memory having a first program for controlling the CPU, a storage memory having a second program for interfacing the storage memory with the system and data, means for sequentially, normally and automatically transferring the second program to the main memory in response to initialization of the CPU, and for transferring control of the CPU to the second program, means for preventing the transfer of control, checking the second program to detect computer virus, and generating an alarm signal if any virus is detected.
  • CPU central processing unit
  • main memory having a first program for controlling the CPU
  • a storage memory having a second program for interfacing the storage memory with the system and data
  • means for preventing the transfer of control checking the second program to detect computer virus, and generating an alarm signal if any virus is detected.
  • Japanese Patent Publication No. 4-42682 discloses a computer system in which data input is made convenient and a response to the data input may be obtained in a short period of time, to thereby enhance data processing efficiency.
  • the finder may operate the computer and read the data stored in the hard disk drive thereof.
  • Disclosure of Invention Therefore, it is an object of the present invention to provide a computer system having a security device in which the computer system may not be operated without a key of the original owner so that the lost computer may easily be returned. It is another object of the present invention to provide a computer system having a security device in which data stored in a hard disk driver (HDD) may not be deleted by detecting a disassembly or damage of the computer.
  • HDD hard disk driver
  • a computer system having a microprocessor for controlling an overall operation, input means for a user input, a hard disk driver, and a backup battery for supplying a power when power interruption occurs, the computer system including display means for displaying data input by the input means, a key which is made up of a memory chip where a user password is stored, key reading means for reading the password stored in the key, disassembly/damage detecting means for detecting disassembly/damage of a computer case, power apply control means for controlling power apply from a power unit when the password stored in the key is read by the key reading means, vibration detecting means for detecting an impact or movement performed by an unauthorized person, alarm generating means for generating an alarm when an impact or vibration is detected by the vibration detecting means, data deleting means for deleting data stored in the hard disk driver when disassembly/damage is detected by the disassembly/damage detection means, circuit destruction means for destructing a
  • Fig. 1 is a schematic view of a notebook computer having a security device according to an embodiment of the present invention.
  • Fig.2 is a block diagram illustrating a computer system having a security device according to the present invention.
  • a computer system having a security device includes a microprocessor 100 for controlling an overall operation, input means 102 for inputting user's command (for example, internet search command, and typed command when the computer is used as a wordprocessor) , a hard disk driver (HDD) 104, a random access memory (RAM) 106 for storing data executed by the HDD 104 in accordance with the user's command input by the input means 102, a read only memory (ROM) 108 for storing execution programs of the microprocessor 100, a backup battery 110 for supplying power when a power interruption occurs, and a floppy disk driver (FDD) 112 for driving a floppy disk so that the data executed by the HDD 104 can be stored according to the user's command input by the input means 102.
  • a microprocessor 100 for controlling an overall operation
  • input means 102 for inputting user's command (for example, internet search command, and typed command when the computer is used as a wordprocessor)
  • HDD hard disk
  • the computer system having a security device further includes display means 114 for displaying data inputted by the input means 102, a key 116 made up of a memory chip where a user's password is stored, key reading means 118 for reading the password stored in the key 116, disassembly/damage detecting means 120 for detecting disassembly/damage of a computer case, power apply control means 124 for controlling power apply from the power unit 122 when the password stored in the key 116 is read by the key reading means 118, vibration detecting means 126 for detecting an impact or movement of the computer system, alarm generating means 128 for generating an alarm if any impact or vibration is detected by the vibration detecting means 126, data deleting means 130 for deleting data stored in the HDD 104 if disassembly/damage is detected by the disassembly/damage detecting means 120, circuit destruction means 134 for destructing a primary o circuit, for example, HDD 104, RAM 106,
  • the finder's guide printed on the sticker 132 is read as 'This computer is for an exclusive use of the owner, and any person who has found this computer will receive the compensation money (for example, KRW100,000 or USD 100.00) if he/she returns this computer to the following address. Tel. No., Name, Address, and the like.”
  • the present invention exemplifies the sticker 132 attached to one surface of the display means 114, the present invention is not limited thereto.
  • the present invention also allows two or more stickers attached to an outer surface of the computer case.
  • the alarm generating means 124 use a common audio card provided in the computer. The sound of the alarm increases in accordance with an elapse of time, and a pre-stored voice (that speaks N, This computer is stolen. If you return this to the owner, you will be paid the compensation money.
  • the contact number is 000-0000" may be played 2 to 12 hours during the lifespan of the backup battery
  • the disassembly/damage detecting means 120 employ a plurality of spring sensors arranged in a coupled portion of the computer case, and the key 116 is embedded with a memory chip of 256-bits or above, magnetic card, RF (radio frequency) card, or IC
  • the input means 102 includes a keyboard and a mouse.
  • the input means 102 includes a keyboard and a mouse.
  • the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If it is the same, a signal is output to the microprocessor 100, to thereby initialize the computer system to be operable. That is, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep sound control signal to the alarm generating means 128 so that a specific beep sound may be generated one time from the alarm generating means 128.
  • the microprocessor 100 outputs a signal to the power apply control means 124 so that the power unit 122 applies a power to the microprocessor 100 in accordance with the operation of the power apply control means 124.
  • the microprocessor 100 may provide each component with a necessary power.
  • the microprocessor 100 When the user inputs data by using the input means 102 like a keyboard or a mouse, the microprocessor 100 operates the HDD 104 in accordance with the execution program stored in the ROM 108 so that data can be stored in the HDD 114, FDD 112, and RAM 106, and simultaneously the data searched or typed is displayed onto the display means.
  • the microprocessor 100 operates the HDD 104 in accordance with the execution program stored in the ROM 108 so that data can be stored in the HDD 114, FDD 112, and RAM 106, and simultaneously the data searched or typed is displayed onto the display means.
  • the user if the user should stay away from the computer, the user touches the key 116 to the key contact portion 118a of the key reading means 118, and the display means 114 turns to a protection screen (screen saver) mode.
  • the vibration detecting means 126 detect such an impact or movement and output the same to the microprocessor 100. Subsequently, the microprocessor 100 outputs an alarm generating signal to the alarm generating means 128 which then generates an alarm beep sound during an operation of the backup battery 110 (approximately 2 to 12 hours) , thus preventing theft of the computer.
  • the finder disassembles or damages the computer case so as to read the data stored in the HDD 104, RAM 106, ROM 108, or the floppy disk in the FDD 112
  • such disassembly or damage is detected by the disassembly/damage detecting means 12 made up of a plurality of spring sensors arranged at the computer case. Then, a signal is output to the microprocessor 100.
  • the microprocessor 100 outputs an alarm generation control signal to the alarm generating means 128, so that an alarm is generated from the alarm generating means 128 during the operation time period of the backup battery 110 (2 to 12 hours) .
  • the microprocessor 100 outputs a data delete control signal to the data deleting means 130, so that the data deleting means 130 outputs a data delete signal so as to delete the data stored in the HDD 104.
  • the circuit destruction means 134 destructs a primary circuit, for example, HDD, RAM, ROM, by applying a high voltage exceeding an operating power. Thus, the computer system may not be forcedly recovered and the data stored in the HDD 104 is prevented from being read by others.
  • the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If the password is determined as different, a signal is output to the microprocessor 100. Then, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep generation control signal to the alarm generating means 128 so that a specific beep sound may be generated from the alarm generating means 128 two or five times. At this time, a power is not applied to the microprocessor 100 from the power unit 122.
  • the computer of the present invention does not operate if the key 116 where the user password is stored is not in contact with the key contact portion 118a. If the key 116 is not in contact with the key contact potion 118a, a power is not provided.
  • the owner intends to move or disassemble the computer, he/she has to touch the key 116 to the key contact portion 118a of the key reading means 118 in order to prevent generation of an alarm from the alarm generating means 128.
  • the present invention is described with reference to the computers like a notebook or a laptop, the present invention is not limited thereto.
  • the present invention may be applied to a common computer like a desk type computer.
  • the computer having a security device is advantageous in that it has at a main body thereof a sticker printed with a finder's guide, so that the lost computer may easily be returned to the owner.
  • the vibration detecting means detect a vibration of the computer, and a signal is output to the microprocessor which controls the alarm generating means to generate an alarm so as to prevent a theft of the computer.
  • the computer operates only when the user password stored in the key is read by the key reading means. When any person who is not the owner attempts to operate the computer, an alarm beep warning that the password is not matched is generated by the key reading means, and a power is not applied to the computer.
  • the alarm generating means When the disassembly/damage detecting means detect an impact or damage of the main body of the computer, the alarm generating means generate an alarm being controlled by the microprocessor, and simultaneously, the data deleting means which receives a control signal outputted from the microprocessor delete the data stored in the hard disk driver, and the circuit damage means destruct the circuit by applying a high voltage to the primary circuit, thus preventing the data stored in the memory device of the computer from being read by other person who is not the owner.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A computer system having a security device in which a power is not applied without a key so as to thereby prevent usage of the computer when lost, has at a main body thereof a sticker printed with a finder's guide, so that the lost computer may easily be returned to the owner. When anyone attempts to move the computer without allowance, vibration detecting means detect a vibration of the computer, and a signal is output to a microprocessor which controls alarm generating means to generate an alarm so as to prevent a theft of the computer. The computer operates only when the user password stored in the key is read by key reading means. When any person who is not the owner attempts to operate the computer, an alarm beep warning that the password is not matched is generated by key reading means, and a power is not applied to the computer. When disassembly/damage detecting means detect an impact or damage of the main body of the computer, alarm generating means generate an alarm being controlled by the microprocessor, and simultaneously, data deleting means which receives a control signal outputted from the microprocessor delete the data stored in the hard disk driver, and circuit damage means destruct a circuit of the computer by applying a high voltage to the primary circuit, thus preventing the data stored in the memory device of the computer from being read by other person who is not the owner.

Description

COMPUTER SYSTEM HAVING A SECURITY DEVICE
Technical Field
The present invention relates to a computer system, and more particularly, to a computer system having a security device in which a power is not applied without a key so as to thereby prevent usage of the computer like a notebook computer or a laptop computer when lost.
In addition, the present invention concerns a computer system having a safety device which prevents data stored in a hard disk drive (HDD) of a computer from being read by other person. When any person tries to steal the computer, a loud alarm is generated so as to prevent a theft thereof.
Background Art
Recently, computers are used in a variety of fields, for example, drawing up of documents or storing and management of data, as personal computers are gaining in popularity. As a method for preserving the data, an output device (like printers) may be used to print the data onto sheets of paper, or hard disks, CD-ROMs, floppy disks, or other data storing media may be used.
As a bidirectional communication between computers is allowed with a rapid spread of Internet, the data stored in a computer may be read by other computers. Thus, security problems arise and computer-related crimes like data robbery or computer data damage has been rapidly increased. Specifically, public organization, company, or research institute which handles confidential document greatly concentrates on safekeeping of data.
PCT Application No. PCT/US89/04908 dated Nov. 1, 1989 (WO Publication No. 90/05418 disclosed at the date of May 17, 1990) and Japanese Patent Publication No. 4-42682 dated July 14, 1992 disclose such a conventional computer.
The computer system disclosed in WO Publication No 90/05418 includes a central processing unit (CPU) , a main memory having a first program for controlling the CPU, a storage memory having a second program for interfacing the storage memory with the system and data, means for sequentially, normally and automatically transferring the second program to the main memory in response to initialization of the CPU, and for transferring control of the CPU to the second program, means for preventing the transfer of control, checking the second program to detect computer virus, and generating an alarm signal if any virus is detected.
Japanese Patent Publication No. 4-42682 discloses a computer system in which data input is made convenient and a response to the data input may be obtained in a short period of time, to thereby enhance data processing efficiency.
However, when such a conventional computer is lost, the finder may operate the computer and read the data stored in the hard disk drive thereof.
Disclosure of Invention Therefore, it is an object of the present invention to provide a computer system having a security device in which the computer system may not be operated without a key of the original owner so that the lost computer may easily be returned. It is another object of the present invention to provide a computer system having a security device in which data stored in a hard disk driver (HDD) may not be deleted by detecting a disassembly or damage of the computer.
It is still another object of the present invention to provide a computer system having a security device in which a loud alarm is generated when anyone attempts to steal the computer system.
To accomplish the above object of the present invention, there is provided a computer system having a microprocessor for controlling an overall operation, input means for a user input, a hard disk driver, and a backup battery for supplying a power when power interruption occurs, the computer system including display means for displaying data input by the input means, a key which is made up of a memory chip where a user password is stored, key reading means for reading the password stored in the key, disassembly/damage detecting means for detecting disassembly/damage of a computer case, power apply control means for controlling power apply from a power unit when the password stored in the key is read by the key reading means, vibration detecting means for detecting an impact or movement performed by an unauthorized person, alarm generating means for generating an alarm when an impact or vibration is detected by the vibration detecting means, data deleting means for deleting data stored in the hard disk driver when disassembly/damage is detected by the disassembly/damage detection means, circuit destruction means for destructing a circuit by applying a high voltage to a primary circuit when disassembly/damage of the computer case is detected by the disassembly/damage detection means, and a sticker printed with a finder' s guide and which is attached to an outer surface of a main body of the computer system so that the computer may easily be returned to the owner.
Brief Description of Drawings
The present invention will become more fully understood from the detailed description given hereinafter accompanying drawings, which are given by way of illustration only, and thus are not limitative of the present invention, and wherein:
Fig. 1 is a schematic view of a notebook computer having a security device according to an embodiment of the present invention; and
Fig.2 is a block diagram illustrating a computer system having a security device according to the present invention.
Best Mode for Carrying Out the Invention
The present invention will be explained in more detail with reference to the attached drawings. Referring to Figs.1 and 2, a computer system having a security device according to the present invention includes a microprocessor 100 for controlling an overall operation, input means 102 for inputting user's command (for example, internet search command, and typed command when the computer is used as a wordprocessor) , a hard disk driver (HDD) 104, a random access memory (RAM) 106 for storing data executed by the HDD 104 in accordance with the user's command input by the input means 102, a read only memory (ROM) 108 for storing execution programs of the microprocessor 100, a backup battery 110 for supplying power when a power interruption occurs, and a floppy disk driver (FDD) 112 for driving a floppy disk so that the data executed by the HDD 104 can be stored according to the user's command input by the input means 102.
The computer system having a security device according to the present invention further includes display means 114 for displaying data inputted by the input means 102, a key 116 made up of a memory chip where a user's password is stored, key reading means 118 for reading the password stored in the key 116, disassembly/damage detecting means 120 for detecting disassembly/damage of a computer case, power apply control means 124 for controlling power apply from the power unit 122 when the password stored in the key 116 is read by the key reading means 118, vibration detecting means 126 for detecting an impact or movement of the computer system, alarm generating means 128 for generating an alarm if any impact or vibration is detected by the vibration detecting means 126, data deleting means 130 for deleting data stored in the HDD 104 if disassembly/damage is detected by the disassembly/damage detecting means 120, circuit destruction means 134 for destructing a primary o circuit, for example, HDD 104, RAM 106, ROM 108, and the FDD 112, by applying a high voltage to the primary circuit if any damage of the computer case is detected by the disassembly/damage detecting means 120, and a sticker 132 printed with a finder's guide so that the lost computer may be easily returned to the owner.
The finder's guide printed on the sticker 132 is read as 'This computer is for an exclusive use of the owner, and any person who has found this computer will receive the compensation money (for example, KRW100,000 or USD 100.00) if he/she returns this computer to the following address. Tel. No., Name, Address, and the like."
Although the present invention exemplifies the sticker 132 attached to one surface of the display means 114, the present invention is not limited thereto. The present invention also allows two or more stickers attached to an outer surface of the computer case. The alarm generating means 124 use a common audio card provided in the computer. The sound of the alarm increases in accordance with an elapse of time, and a pre-stored voice (that speaks N,This computer is stolen. If you return this to the owner, you will be paid the compensation money. The contact number is 000-0000") may be played 2 to 12 hours during the lifespan of the backup battery
110.
The disassembly/damage detecting means 120 employ a plurality of spring sensors arranged in a coupled portion of the computer case, and the key 116 is embedded with a memory chip of 256-bits or above, magnetic card, RF (radio frequency) card, or IC
(integrated circuit) chip provided with a fingerprint, voice, password recognition function.
The input means 102 includes a keyboard and a mouse. Thus-configured computer system operates as follows. When a user touches the key 116 where user data (password) is stored to a key contact unit 118a, the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If it is the same, a signal is output to the microprocessor 100, to thereby initialize the computer system to be operable. That is, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep sound control signal to the alarm generating means 128 so that a specific beep sound may be generated one time from the alarm generating means 128. At the same time, the microprocessor 100 outputs a signal to the power apply control means 124 so that the power unit 122 applies a power to the microprocessor 100 in accordance with the operation of the power apply control means 124. Thus, the microprocessor 100 may provide each component with a necessary power.
When the user inputs data by using the input means 102 like a keyboard or a mouse, the microprocessor 100 operates the HDD 104 in accordance with the execution program stored in the ROM 108 so that data can be stored in the HDD 114, FDD 112, and RAM 106, and simultaneously the data searched or typed is displayed onto the display means. During such a normal operation of computer, if the user should stay away from the computer, the user touches the key 116 to the key contact portion 118a of the key reading means 118, and the display means 114 turns to a protection screen (screen saver) mode.
If any person attempts to operate the computer by touching an imitation key to the key contact portion 118a of the key reading means 118, an alarm beep sound is generated from the alarm generating means 128, to thereby stop the operation of the computer.
If, at the state where the alarm function of the computer system is not released, an external impact is applied to the computer or any person attempts to move the computer (for purpose of theft), the vibration detecting means 126 detect such an impact or movement and output the same to the microprocessor 100. Subsequently, the microprocessor 100 outputs an alarm generating signal to the alarm generating means 128 which then generates an alarm beep sound during an operation of the backup battery 110 (approximately 2 to 12 hours) , thus preventing theft of the computer.
If the computer of the present invention is lost and the finder disassembles or damages the computer case so as to read the data stored in the HDD 104, RAM 106, ROM 108, or the floppy disk in the FDD 112, such disassembly or damage is detected by the disassembly/damage detecting means 12 made up of a plurality of spring sensors arranged at the computer case. Then, a signal is output to the microprocessor 100.
Subsequently, the microprocessor 100 outputs an alarm generation control signal to the alarm generating means 128, so that an alarm is generated from the alarm generating means 128 during the operation time period of the backup battery 110 (2 to 12 hours) . At the same time, the microprocessor 100 outputs a data delete control signal to the data deleting means 130, so that the data deleting means 130 outputs a data delete signal so as to delete the data stored in the HDD 104. In addition, the circuit destruction means 134 destructs a primary circuit, for example, HDD, RAM, ROM, by applying a high voltage exceeding an operating power. Thus, the computer system may not be forcedly recovered and the data stored in the HDD 104 is prevented from being read by others.
Meanwhile, if the owner of the computer touches the key 116 where the user data (password) is stored to the contact portion 118a of the key reading means 118, the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If the password is determined as different, a signal is output to the microprocessor 100. Then, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep generation control signal to the alarm generating means 128 so that a specific beep sound may be generated from the alarm generating means 128 two or five times. At this time, a power is not applied to the microprocessor 100 from the power unit 122.
That is, the computer of the present invention does not operate if the key 116 where the user password is stored is not in contact with the key contact portion 118a. If the key 116 is not in contact with the key contact potion 118a, a power is not provided. When the owner intends to move or disassemble the computer, he/she has to touch the key 116 to the key contact portion 118a of the key reading means 118 in order to prevent generation of an alarm from the alarm generating means 128.
While the present invention is described with reference to the computers like a notebook or a laptop, the present invention is not limited thereto. The present invention may be applied to a common computer like a desk type computer.
As described above, the computer having a security device according to an embodiment of the present invention is advantageous in that it has at a main body thereof a sticker printed with a finder's guide, so that the lost computer may easily be returned to the owner. When anyone attempts to move the computer without allowance, the vibration detecting means detect a vibration of the computer, and a signal is output to the microprocessor which controls the alarm generating means to generate an alarm so as to prevent a theft of the computer. The computer operates only when the user password stored in the key is read by the key reading means. When any person who is not the owner attempts to operate the computer, an alarm beep warning that the password is not matched is generated by the key reading means, and a power is not applied to the computer. When the disassembly/damage detecting means detect an impact or damage of the main body of the computer, the alarm generating means generate an alarm being controlled by the microprocessor, and simultaneously, the data deleting means which receives a control signal outputted from the microprocessor delete the data stored in the hard disk driver, and the circuit damage means destruct the circuit by applying a high voltage to the primary circuit, thus preventing the data stored in the memory device of the computer from being read by other person who is not the owner.

Claims

1. A computer having a security device including a microprocessor for controlling an overall operation, input means for a user input, a hard disk driver (HDD) , a random access memory (RAM) for storing data executed by said HDD in accordance with said user input, a read onlymemory (ROM) for storing an execution program of said microprocessor, a backup battery for supplying a power when power interruption occurs, and a floppy disk driver (FDD) for driving a floppy disk so as to store the data executed by said HDD in accordance with said user input, said computer system comprising: display means for displaying data inputted by said input means; a key which is made up of a memory chip where a user password is stored; key reading means for reading a password stored in said key; disassembly/damage detecting means for detecting disassembly/damage of a computer case; power apply control means for controlling a power apply from a power unit when said password stored in said key is read by said key reading means; vibration detecting means for detecting an impact or movement caused by an unauthorized person; alarm generating means for generating an alarm when an impact or vibration is detected by said vibration detecting means; data deleting means for deleting data stored in said HDD when disassembly/damage is detected by said disassembly/damage detection means; circuit destruction means for destructing a circuit by applying a high voltage to a primary circuit when disassembly/damage of said computer case is detected by said disassembly/damage detection means; and a sticker printed with a finder' s guide and which is attached to an outer surface of a main body of said computer system so that said computer may easily be returned to an owner.
2. A computer having a security device according to claim 1, wherein said finder's guide printed on said sticker is read 'This computer may not be used by other people except the owner . Any person who finds this computer will be paid the compensation if he/she gives a call or returns this computer to the following address; telephone number 000-0000, owner's name."
3. A computer having a security device according to claim 1, wherein said finder' s guide printed on said sticker includes owner' s name, telephone number, and address.
4. A computer having a security device according to claim 1, wherein said key is made up of a memory chip of 256-bits to lOk-bits or above, magnetic card, RF (radio frequency) card, and IC (integrated circuit) chip having a fingerprint recognition, voice recognition, and password recognition function.
PCT/KR1999/000772 1998-12-31 1999-12-14 Computer system having a security device Ceased WO2000041058A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1019980063363A KR100296371B1 (en) 1998-12-31 1998-12-31 Computer having security device
KR1998/63363 1998-12-31

Publications (1)

Publication Number Publication Date
WO2000041058A1 true WO2000041058A1 (en) 2000-07-13

Family

ID=19569952

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR1999/000772 Ceased WO2000041058A1 (en) 1998-12-31 1999-12-14 Computer system having a security device

Country Status (2)

Country Link
KR (1) KR100296371B1 (en)
WO (1) WO2000041058A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008091553A1 (en) * 2007-01-23 2008-07-31 Hewlett-Packard Development Company, L.P. Portable computing system docking security system and method
WO2008127433A3 (en) * 2006-11-25 2009-03-19 Clevx Llc Memory protection system
CN100543633C (en) * 2005-09-23 2009-09-23 广达电脑股份有限公司 Portable computer and safety protection method thereof
WO2012034453A1 (en) * 2010-09-14 2012-03-22 湖南源科高新技术有限公司 Method for clearing computer data and computer
EP2732608A1 (en) * 2011-07-14 2014-05-21 Qualcomm Incorporated Method and apparatus for detecting and dealing with a lost electronics device
US11444764B2 (en) * 2019-07-17 2022-09-13 L3Harris Technologies, Inc. Watchdog key system for data security in unmanned undersea vehicles

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020001294A (en) * 2000-06-27 2002-01-09 김형남 The prevention of robbed/security method for apparatus thereof
KR100464235B1 (en) * 2001-11-21 2005-01-03 임병갑 Fingerprinting mouse consolidated security
KR100443203B1 (en) * 2001-11-22 2004-08-04 주식회사 알엔디소프트 Security method for application program using message hooking
KR100489793B1 (en) * 2002-11-15 2005-05-16 엘지전자 주식회사 Method and system of warning approach of stranger for computer system
KR100988414B1 (en) 2007-09-07 2010-10-18 (주)밀레니엄 포스 Data security
CN103839014B (en) * 2014-03-19 2017-02-22 深圳市亿道信息股份有限公司 Self-destruction circuit of tablet personal computer storage device
CN105657169B (en) * 2016-01-05 2019-02-19 Oppo广东移动通信有限公司 A data protection method, device and mobile terminal
CN107657183B (en) * 2017-08-31 2020-03-27 中国人民解放军海军医学研究所 Data security protection method and device for electronic equipment
KR102905542B1 (en) 2020-04-22 2025-12-31 삼성전자주식회사 Storage device with structure for improving security performance and removing data and method of operating the same

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08249546A (en) * 1995-03-08 1996-09-27 Fujikura Ltd Mobile terminal
US5648762A (en) * 1994-02-04 1997-07-15 Canon Kabushiki Kaisha Built-in electronic apparatus and device-detaching method therefor
KR970067029A (en) * 1996-03-20 1997-10-13 김광호 Portable computer device having a burglar alarm function and its alarm function control method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5648762A (en) * 1994-02-04 1997-07-15 Canon Kabushiki Kaisha Built-in electronic apparatus and device-detaching method therefor
JPH08249546A (en) * 1995-03-08 1996-09-27 Fujikura Ltd Mobile terminal
KR970067029A (en) * 1996-03-20 1997-10-13 김광호 Portable computer device having a burglar alarm function and its alarm function control method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN vol. 1997, no. 01 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100543633C (en) * 2005-09-23 2009-09-23 广达电脑股份有限公司 Portable computer and safety protection method thereof
WO2008127433A3 (en) * 2006-11-25 2009-03-19 Clevx Llc Memory protection system
WO2008091553A1 (en) * 2007-01-23 2008-07-31 Hewlett-Packard Development Company, L.P. Portable computing system docking security system and method
GB2458849A (en) * 2007-01-23 2009-10-07 Hewlett Packard Development Co Portable computing system docking security system and method
US7993414B2 (en) 2007-01-23 2011-08-09 Hewlett-Packard Development Company, L.P. Portable computing system docking security system and method
GB2458849B (en) * 2007-01-23 2011-09-14 Hewlett Packard Development Co Portable computing system docking security system and method
WO2012034453A1 (en) * 2010-09-14 2012-03-22 湖南源科高新技术有限公司 Method for clearing computer data and computer
EP2732608A1 (en) * 2011-07-14 2014-05-21 Qualcomm Incorporated Method and apparatus for detecting and dealing with a lost electronics device
US9954829B2 (en) 2011-07-14 2018-04-24 Qualcomm Incorporated Method and apparatus for detecting and dealing with a lost electronics device
US10009323B2 (en) 2011-07-14 2018-06-26 Qualcomm Incorporated Method and apparatus for detecting and dealing with a lost electronics device
US11444764B2 (en) * 2019-07-17 2022-09-13 L3Harris Technologies, Inc. Watchdog key system for data security in unmanned undersea vehicles

Also Published As

Publication number Publication date
KR19990037629A (en) 1999-05-25
KR100296371B1 (en) 2001-08-07

Similar Documents

Publication Publication Date Title
WO2000041058A1 (en) Computer system having a security device
US10713343B2 (en) Methods, devices and systems for authenticated access to electronic device in a closed configuration
US20030014660A1 (en) PC card security system
US8634808B1 (en) Mobile device loss prevention
US8019131B2 (en) Authentication apparatus and method, and electronic device using the same
US20070136593A1 (en) Secure information storage apparatus
WO2005081197A1 (en) Information processing device and method for preventing theft of the information processing device
JP2000235427A (en) Portable electronic device key
US20080122801A1 (en) Electronic devices having a touch screen and method for starting the electronic devices
JP3467248B2 (en) Computer automatic recognition system using IC card
US6294995B1 (en) Anti-theft alarm for portable computer
US20070030257A1 (en) Locking digital pen
US20020095608A1 (en) Access control apparatus and method for electronic device
JP2000172960A (en) Theft-preventing device for portable electronic device
JP2000315120A (en) Information processing apparatus, information processing method, and storage medium storing information processing program
US20020169989A1 (en) Method and apparatus for access security in computers
US11836561B2 (en) Key fob duplication device
JPH09185554A (en) Information protection device
JP2001291050A (en) Card reader provided with security function
JP2011107956A (en) Computer system
US20070143627A1 (en) Input device and password control method used therein
JPH08249546A (en) Mobile terminal
JP2001331235A (en) Information processing device
US20090212949A1 (en) Alarm, and detection and alarming method thereof
CN101441496B (en) Portable computer device and anti-theft method thereof

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): CA CN JP US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase