WO2000041058A1 - Computer system having a security device - Google Patents
Computer system having a security device Download PDFInfo
- Publication number
- WO2000041058A1 WO2000041058A1 PCT/KR1999/000772 KR9900772W WO0041058A1 WO 2000041058 A1 WO2000041058 A1 WO 2000041058A1 KR 9900772 W KR9900772 W KR 9900772W WO 0041058 A1 WO0041058 A1 WO 0041058A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- key
- damage
- disassembly
- alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1615—Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function
- G06F1/1616—Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function with folding flat displays, e.g. laptop computers or notebooks having a clamshell configuration, with body parts pivoting to an open position around an axis parallel to the plane they define in closed position
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1656—Details related to functional adaptations of the enclosure, e.g. to provide protection against EMI, shock, water, or to host detachable peripherals like a mouse or removable expansions units like PCMCIA cards, or to provide access to internal components for maintenance or to removable storage supports like CDs or DVDs, or to mechanically mount accessories
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
- G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/88—Detecting or preventing theft or loss
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Definitions
- the present invention relates to a computer system, and more particularly, to a computer system having a security device in which a power is not applied without a key so as to thereby prevent usage of the computer like a notebook computer or a laptop computer when lost.
- the present invention concerns a computer system having a safety device which prevents data stored in a hard disk drive (HDD) of a computer from being read by other person.
- HDD hard disk drive
- an output device may be used to print the data onto sheets of paper, or hard disks, CD-ROMs, floppy disks, or other data storing media may be used.
- the computer system disclosed in WO Publication No 90/05418 includes a central processing unit (CPU) , a main memory having a first program for controlling the CPU, a storage memory having a second program for interfacing the storage memory with the system and data, means for sequentially, normally and automatically transferring the second program to the main memory in response to initialization of the CPU, and for transferring control of the CPU to the second program, means for preventing the transfer of control, checking the second program to detect computer virus, and generating an alarm signal if any virus is detected.
- CPU central processing unit
- main memory having a first program for controlling the CPU
- a storage memory having a second program for interfacing the storage memory with the system and data
- means for preventing the transfer of control checking the second program to detect computer virus, and generating an alarm signal if any virus is detected.
- Japanese Patent Publication No. 4-42682 discloses a computer system in which data input is made convenient and a response to the data input may be obtained in a short period of time, to thereby enhance data processing efficiency.
- the finder may operate the computer and read the data stored in the hard disk drive thereof.
- Disclosure of Invention Therefore, it is an object of the present invention to provide a computer system having a security device in which the computer system may not be operated without a key of the original owner so that the lost computer may easily be returned. It is another object of the present invention to provide a computer system having a security device in which data stored in a hard disk driver (HDD) may not be deleted by detecting a disassembly or damage of the computer.
- HDD hard disk driver
- a computer system having a microprocessor for controlling an overall operation, input means for a user input, a hard disk driver, and a backup battery for supplying a power when power interruption occurs, the computer system including display means for displaying data input by the input means, a key which is made up of a memory chip where a user password is stored, key reading means for reading the password stored in the key, disassembly/damage detecting means for detecting disassembly/damage of a computer case, power apply control means for controlling power apply from a power unit when the password stored in the key is read by the key reading means, vibration detecting means for detecting an impact or movement performed by an unauthorized person, alarm generating means for generating an alarm when an impact or vibration is detected by the vibration detecting means, data deleting means for deleting data stored in the hard disk driver when disassembly/damage is detected by the disassembly/damage detection means, circuit destruction means for destructing a
- Fig. 1 is a schematic view of a notebook computer having a security device according to an embodiment of the present invention.
- Fig.2 is a block diagram illustrating a computer system having a security device according to the present invention.
- a computer system having a security device includes a microprocessor 100 for controlling an overall operation, input means 102 for inputting user's command (for example, internet search command, and typed command when the computer is used as a wordprocessor) , a hard disk driver (HDD) 104, a random access memory (RAM) 106 for storing data executed by the HDD 104 in accordance with the user's command input by the input means 102, a read only memory (ROM) 108 for storing execution programs of the microprocessor 100, a backup battery 110 for supplying power when a power interruption occurs, and a floppy disk driver (FDD) 112 for driving a floppy disk so that the data executed by the HDD 104 can be stored according to the user's command input by the input means 102.
- a microprocessor 100 for controlling an overall operation
- input means 102 for inputting user's command (for example, internet search command, and typed command when the computer is used as a wordprocessor)
- HDD hard disk
- the computer system having a security device further includes display means 114 for displaying data inputted by the input means 102, a key 116 made up of a memory chip where a user's password is stored, key reading means 118 for reading the password stored in the key 116, disassembly/damage detecting means 120 for detecting disassembly/damage of a computer case, power apply control means 124 for controlling power apply from the power unit 122 when the password stored in the key 116 is read by the key reading means 118, vibration detecting means 126 for detecting an impact or movement of the computer system, alarm generating means 128 for generating an alarm if any impact or vibration is detected by the vibration detecting means 126, data deleting means 130 for deleting data stored in the HDD 104 if disassembly/damage is detected by the disassembly/damage detecting means 120, circuit destruction means 134 for destructing a primary o circuit, for example, HDD 104, RAM 106,
- the finder's guide printed on the sticker 132 is read as 'This computer is for an exclusive use of the owner, and any person who has found this computer will receive the compensation money (for example, KRW100,000 or USD 100.00) if he/she returns this computer to the following address. Tel. No., Name, Address, and the like.”
- the present invention exemplifies the sticker 132 attached to one surface of the display means 114, the present invention is not limited thereto.
- the present invention also allows two or more stickers attached to an outer surface of the computer case.
- the alarm generating means 124 use a common audio card provided in the computer. The sound of the alarm increases in accordance with an elapse of time, and a pre-stored voice (that speaks N, This computer is stolen. If you return this to the owner, you will be paid the compensation money.
- the contact number is 000-0000" may be played 2 to 12 hours during the lifespan of the backup battery
- the disassembly/damage detecting means 120 employ a plurality of spring sensors arranged in a coupled portion of the computer case, and the key 116 is embedded with a memory chip of 256-bits or above, magnetic card, RF (radio frequency) card, or IC
- the input means 102 includes a keyboard and a mouse.
- the input means 102 includes a keyboard and a mouse.
- the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If it is the same, a signal is output to the microprocessor 100, to thereby initialize the computer system to be operable. That is, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep sound control signal to the alarm generating means 128 so that a specific beep sound may be generated one time from the alarm generating means 128.
- the microprocessor 100 outputs a signal to the power apply control means 124 so that the power unit 122 applies a power to the microprocessor 100 in accordance with the operation of the power apply control means 124.
- the microprocessor 100 may provide each component with a necessary power.
- the microprocessor 100 When the user inputs data by using the input means 102 like a keyboard or a mouse, the microprocessor 100 operates the HDD 104 in accordance with the execution program stored in the ROM 108 so that data can be stored in the HDD 114, FDD 112, and RAM 106, and simultaneously the data searched or typed is displayed onto the display means.
- the microprocessor 100 operates the HDD 104 in accordance with the execution program stored in the ROM 108 so that data can be stored in the HDD 114, FDD 112, and RAM 106, and simultaneously the data searched or typed is displayed onto the display means.
- the user if the user should stay away from the computer, the user touches the key 116 to the key contact portion 118a of the key reading means 118, and the display means 114 turns to a protection screen (screen saver) mode.
- the vibration detecting means 126 detect such an impact or movement and output the same to the microprocessor 100. Subsequently, the microprocessor 100 outputs an alarm generating signal to the alarm generating means 128 which then generates an alarm beep sound during an operation of the backup battery 110 (approximately 2 to 12 hours) , thus preventing theft of the computer.
- the finder disassembles or damages the computer case so as to read the data stored in the HDD 104, RAM 106, ROM 108, or the floppy disk in the FDD 112
- such disassembly or damage is detected by the disassembly/damage detecting means 12 made up of a plurality of spring sensors arranged at the computer case. Then, a signal is output to the microprocessor 100.
- the microprocessor 100 outputs an alarm generation control signal to the alarm generating means 128, so that an alarm is generated from the alarm generating means 128 during the operation time period of the backup battery 110 (2 to 12 hours) .
- the microprocessor 100 outputs a data delete control signal to the data deleting means 130, so that the data deleting means 130 outputs a data delete signal so as to delete the data stored in the HDD 104.
- the circuit destruction means 134 destructs a primary circuit, for example, HDD, RAM, ROM, by applying a high voltage exceeding an operating power. Thus, the computer system may not be forcedly recovered and the data stored in the HDD 104 is prevented from being read by others.
- the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If the password is determined as different, a signal is output to the microprocessor 100. Then, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep generation control signal to the alarm generating means 128 so that a specific beep sound may be generated from the alarm generating means 128 two or five times. At this time, a power is not applied to the microprocessor 100 from the power unit 122.
- the computer of the present invention does not operate if the key 116 where the user password is stored is not in contact with the key contact portion 118a. If the key 116 is not in contact with the key contact potion 118a, a power is not provided.
- the owner intends to move or disassemble the computer, he/she has to touch the key 116 to the key contact portion 118a of the key reading means 118 in order to prevent generation of an alarm from the alarm generating means 128.
- the present invention is described with reference to the computers like a notebook or a laptop, the present invention is not limited thereto.
- the present invention may be applied to a common computer like a desk type computer.
- the computer having a security device is advantageous in that it has at a main body thereof a sticker printed with a finder's guide, so that the lost computer may easily be returned to the owner.
- the vibration detecting means detect a vibration of the computer, and a signal is output to the microprocessor which controls the alarm generating means to generate an alarm so as to prevent a theft of the computer.
- the computer operates only when the user password stored in the key is read by the key reading means. When any person who is not the owner attempts to operate the computer, an alarm beep warning that the password is not matched is generated by the key reading means, and a power is not applied to the computer.
- the alarm generating means When the disassembly/damage detecting means detect an impact or damage of the main body of the computer, the alarm generating means generate an alarm being controlled by the microprocessor, and simultaneously, the data deleting means which receives a control signal outputted from the microprocessor delete the data stored in the hard disk driver, and the circuit damage means destruct the circuit by applying a high voltage to the primary circuit, thus preventing the data stored in the memory device of the computer from being read by other person who is not the owner.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Mathematical Physics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
- Burglar Alarm Systems (AREA)
Abstract
A computer system having a security device in which a power is not applied without a key so as to thereby prevent usage of the computer when lost, has at a main body thereof a sticker printed with a finder's guide, so that the lost computer may easily be returned to the owner. When anyone attempts to move the computer without allowance, vibration detecting means detect a vibration of the computer, and a signal is output to a microprocessor which controls alarm generating means to generate an alarm so as to prevent a theft of the computer. The computer operates only when the user password stored in the key is read by key reading means. When any person who is not the owner attempts to operate the computer, an alarm beep warning that the password is not matched is generated by key reading means, and a power is not applied to the computer. When disassembly/damage detecting means detect an impact or damage of the main body of the computer, alarm generating means generate an alarm being controlled by the microprocessor, and simultaneously, data deleting means which receives a control signal outputted from the microprocessor delete the data stored in the hard disk driver, and circuit damage means destruct a circuit of the computer by applying a high voltage to the primary circuit, thus preventing the data stored in the memory device of the computer from being read by other person who is not the owner.
Description
COMPUTER SYSTEM HAVING A SECURITY DEVICE
Technical Field
The present invention relates to a computer system, and more particularly, to a computer system having a security device in which a power is not applied without a key so as to thereby prevent usage of the computer like a notebook computer or a laptop computer when lost.
In addition, the present invention concerns a computer system having a safety device which prevents data stored in a hard disk drive (HDD) of a computer from being read by other person. When any person tries to steal the computer, a loud alarm is generated so as to prevent a theft thereof.
Background Art
Recently, computers are used in a variety of fields, for example, drawing up of documents or storing and management of data, as personal computers are gaining in popularity. As a method for preserving the data, an output device (like printers) may be used to print the data onto sheets of paper, or hard disks, CD-ROMs, floppy disks, or other data storing media may be used.
As a bidirectional communication between computers is allowed with a rapid spread of Internet, the data stored in a computer may be read by other computers. Thus, security problems arise and computer-related crimes like data robbery or computer data damage has been rapidly increased.
Specifically, public organization, company, or research institute which handles confidential document greatly concentrates on safekeeping of data.
PCT Application No. PCT/US89/04908 dated Nov. 1, 1989 (WO Publication No. 90/05418 disclosed at the date of May 17, 1990) and Japanese Patent Publication No. 4-42682 dated July 14, 1992 disclose such a conventional computer.
The computer system disclosed in WO Publication No 90/05418 includes a central processing unit (CPU) , a main memory having a first program for controlling the CPU, a storage memory having a second program for interfacing the storage memory with the system and data, means for sequentially, normally and automatically transferring the second program to the main memory in response to initialization of the CPU, and for transferring control of the CPU to the second program, means for preventing the transfer of control, checking the second program to detect computer virus, and generating an alarm signal if any virus is detected.
Japanese Patent Publication No. 4-42682 discloses a computer system in which data input is made convenient and a response to the data input may be obtained in a short period of time, to thereby enhance data processing efficiency.
However, when such a conventional computer is lost, the finder may operate the computer and read the data stored in the hard disk drive thereof.
Disclosure of Invention
Therefore, it is an object of the present invention to provide a computer system having a security device in which the computer system may not be operated without a key of the original owner so that the lost computer may easily be returned. It is another object of the present invention to provide a computer system having a security device in which data stored in a hard disk driver (HDD) may not be deleted by detecting a disassembly or damage of the computer.
It is still another object of the present invention to provide a computer system having a security device in which a loud alarm is generated when anyone attempts to steal the computer system.
To accomplish the above object of the present invention, there is provided a computer system having a microprocessor for controlling an overall operation, input means for a user input, a hard disk driver, and a backup battery for supplying a power when power interruption occurs, the computer system including display means for displaying data input by the input means, a key which is made up of a memory chip where a user password is stored, key reading means for reading the password stored in the key, disassembly/damage detecting means for detecting disassembly/damage of a computer case, power apply control means for controlling power apply from a power unit when the password stored in the key is read by the key reading means, vibration detecting means for detecting an impact or movement performed by an unauthorized person, alarm generating means for generating an alarm when an impact or vibration is detected by the vibration
detecting means, data deleting means for deleting data stored in the hard disk driver when disassembly/damage is detected by the disassembly/damage detection means, circuit destruction means for destructing a circuit by applying a high voltage to a primary circuit when disassembly/damage of the computer case is detected by the disassembly/damage detection means, and a sticker printed with a finder' s guide and which is attached to an outer surface of a main body of the computer system so that the computer may easily be returned to the owner.
Brief Description of Drawings
The present invention will become more fully understood from the detailed description given hereinafter accompanying drawings, which are given by way of illustration only, and thus are not limitative of the present invention, and wherein:
Fig. 1 is a schematic view of a notebook computer having a security device according to an embodiment of the present invention; and
Fig.2 is a block diagram illustrating a computer system having a security device according to the present invention.
Best Mode for Carrying Out the Invention
The present invention will be explained in more detail with reference to the attached drawings. Referring to Figs.1 and 2, a computer system having a security device according to the present invention includes a microprocessor
100 for controlling an overall operation, input means 102 for inputting user's command (for example, internet search command, and typed command when the computer is used as a wordprocessor) , a hard disk driver (HDD) 104, a random access memory (RAM) 106 for storing data executed by the HDD 104 in accordance with the user's command input by the input means 102, a read only memory (ROM) 108 for storing execution programs of the microprocessor 100, a backup battery 110 for supplying power when a power interruption occurs, and a floppy disk driver (FDD) 112 for driving a floppy disk so that the data executed by the HDD 104 can be stored according to the user's command input by the input means 102.
The computer system having a security device according to the present invention further includes display means 114 for displaying data inputted by the input means 102, a key 116 made up of a memory chip where a user's password is stored, key reading means 118 for reading the password stored in the key 116, disassembly/damage detecting means 120 for detecting disassembly/damage of a computer case, power apply control means 124 for controlling power apply from the power unit 122 when the password stored in the key 116 is read by the key reading means 118, vibration detecting means 126 for detecting an impact or movement of the computer system, alarm generating means 128 for generating an alarm if any impact or vibration is detected by the vibration detecting means 126, data deleting means 130 for deleting data stored in the HDD 104 if disassembly/damage is detected by the disassembly/damage detecting means 120, circuit destruction means 134 for destructing a primary
o circuit, for example, HDD 104, RAM 106, ROM 108, and the FDD 112, by applying a high voltage to the primary circuit if any damage of the computer case is detected by the disassembly/damage detecting means 120, and a sticker 132 printed with a finder's guide so that the lost computer may be easily returned to the owner.
The finder's guide printed on the sticker 132 is read as 'This computer is for an exclusive use of the owner, and any person who has found this computer will receive the compensation money (for example, KRW100,000 or USD 100.00) if he/she returns this computer to the following address. Tel. No., Name, Address, and the like."
Although the present invention exemplifies the sticker 132 attached to one surface of the display means 114, the present invention is not limited thereto. The present invention also allows two or more stickers attached to an outer surface of the computer case. The alarm generating means 124 use a common audio card provided in the computer. The sound of the alarm increases in accordance with an elapse of time, and a pre-stored voice (that speaks N,This computer is stolen. If you return this to the owner, you will be paid the compensation money. The contact number is 000-0000") may be played 2 to 12 hours during the lifespan of the backup battery
110.
The disassembly/damage detecting means 120 employ a plurality of spring sensors arranged in a coupled portion of the computer case, and the key 116 is embedded with a memory chip of 256-bits or above, magnetic card, RF (radio frequency) card, or IC
(integrated circuit) chip provided with a fingerprint, voice,
password recognition function.
The input means 102 includes a keyboard and a mouse. Thus-configured computer system operates as follows. When a user touches the key 116 where user data (password) is stored to a key contact unit 118a, the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If it is the same, a signal is output to the microprocessor 100, to thereby initialize the computer system to be operable. That is, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep sound control signal to the alarm generating means 128 so that a specific beep sound may be generated one time from the alarm generating means 128. At the same time, the microprocessor 100 outputs a signal to the power apply control means 124 so that the power unit 122 applies a power to the microprocessor 100 in accordance with the operation of the power apply control means 124. Thus, the microprocessor 100 may provide each component with a necessary power.
When the user inputs data by using the input means 102 like a keyboard or a mouse, the microprocessor 100 operates the HDD 104 in accordance with the execution program stored in the ROM 108 so that data can be stored in the HDD 114, FDD 112, and RAM 106, and simultaneously the data searched or typed is displayed onto the display means. During such a normal operation of computer, if the user should stay away from the computer, the user touches the key 116 to the
key contact portion 118a of the key reading means 118, and the display means 114 turns to a protection screen (screen saver) mode.
If any person attempts to operate the computer by touching an imitation key to the key contact portion 118a of the key reading means 118, an alarm beep sound is generated from the alarm generating means 128, to thereby stop the operation of the computer.
If, at the state where the alarm function of the computer system is not released, an external impact is applied to the computer or any person attempts to move the computer (for purpose of theft), the vibration detecting means 126 detect such an impact or movement and output the same to the microprocessor 100. Subsequently, the microprocessor 100 outputs an alarm generating signal to the alarm generating means 128 which then generates an alarm beep sound during an operation of the backup battery 110 (approximately 2 to 12 hours) , thus preventing theft of the computer.
If the computer of the present invention is lost and the finder disassembles or damages the computer case so as to read the data stored in the HDD 104, RAM 106, ROM 108, or the floppy disk in the FDD 112, such disassembly or damage is detected by the disassembly/damage detecting means 12 made up of a plurality of spring sensors arranged at the computer case. Then, a signal is output to the microprocessor 100.
Subsequently, the microprocessor 100 outputs an alarm generation control signal to the alarm generating means 128, so that an alarm is generated from the alarm generating means 128 during the operation time period of the backup battery 110 (2 to 12 hours) .
At the same time, the microprocessor 100 outputs a data delete control signal to the data deleting means 130, so that the data deleting means 130 outputs a data delete signal so as to delete the data stored in the HDD 104. In addition, the circuit destruction means 134 destructs a primary circuit, for example, HDD, RAM, ROM, by applying a high voltage exceeding an operating power. Thus, the computer system may not be forcedly recovered and the data stored in the HDD 104 is prevented from being read by others.
Meanwhile, if the owner of the computer touches the key 116 where the user data (password) is stored to the contact portion 118a of the key reading means 118, the key reading means 118 determines whether the password stored in the key 116 is the same as that stored in the key reading means 118. If the password is determined as different, a signal is output to the microprocessor 100. Then, the microprocessor 100 receives the signal output from the key reading means 118, and outputs a beep generation control signal to the alarm generating means 128 so that a specific beep sound may be generated from the alarm generating means 128 two or five times. At this time, a power is not applied to the microprocessor 100 from the power unit 122.
That is, the computer of the present invention does not operate if the key 116 where the user password is stored is not in contact with the key contact portion 118a. If the key 116 is not in contact with the key contact potion 118a, a power is not provided. When the owner intends to move or disassemble the computer, he/she has to touch the key 116 to the key contact portion 118a
of the key reading means 118 in order to prevent generation of an alarm from the alarm generating means 128.
While the present invention is described with reference to the computers like a notebook or a laptop, the present invention is not limited thereto. The present invention may be applied to a common computer like a desk type computer.
As described above, the computer having a security device according to an embodiment of the present invention is advantageous in that it has at a main body thereof a sticker printed with a finder's guide, so that the lost computer may easily be returned to the owner. When anyone attempts to move the computer without allowance, the vibration detecting means detect a vibration of the computer, and a signal is output to the microprocessor which controls the alarm generating means to generate an alarm so as to prevent a theft of the computer. The computer operates only when the user password stored in the key is read by the key reading means. When any person who is not the owner attempts to operate the computer, an alarm beep warning that the password is not matched is generated by the key reading means, and a power is not applied to the computer. When the disassembly/damage detecting means detect an impact or damage of the main body of the computer, the alarm generating means generate an alarm being controlled by the microprocessor, and simultaneously, the data deleting means which receives a control signal outputted from the microprocessor delete the data stored in the hard disk driver, and the circuit damage means destruct the circuit by applying a high voltage to the primary circuit, thus preventing
the data stored in the memory device of the computer from being read by other person who is not the owner.
Claims
1. A computer having a security device including a microprocessor for controlling an overall operation, input means for a user input, a hard disk driver (HDD) , a random access memory (RAM) for storing data executed by said HDD in accordance with said user input, a read onlymemory (ROM) for storing an execution program of said microprocessor, a backup battery for supplying a power when power interruption occurs, and a floppy disk driver (FDD) for driving a floppy disk so as to store the data executed by said HDD in accordance with said user input, said computer system comprising: display means for displaying data inputted by said input means; a key which is made up of a memory chip where a user password is stored; key reading means for reading a password stored in said key; disassembly/damage detecting means for detecting disassembly/damage of a computer case; power apply control means for controlling a power apply from a power unit when said password stored in said key is read by said key reading means; vibration detecting means for detecting an impact or movement caused by an unauthorized person; alarm generating means for generating an alarm when an impact or vibration is detected by said vibration detecting means; data deleting means for deleting data stored in said HDD when disassembly/damage is detected by said disassembly/damage detection means; circuit destruction means for destructing a circuit by applying a high voltage to a primary circuit when disassembly/damage of said computer case is detected by said disassembly/damage detection means; and a sticker printed with a finder' s guide and which is attached to an outer surface of a main body of said computer system so that said computer may easily be returned to an owner.
2. A computer having a security device according to claim 1, wherein said finder's guide printed on said sticker is read 'This computer may not be used by other people except the owner . Any person who finds this computer will be paid the compensation if he/she gives a call or returns this computer to the following address; telephone number 000-0000, owner's name."
3. A computer having a security device according to claim 1, wherein said finder' s guide printed on said sticker includes owner' s name, telephone number, and address.
4. A computer having a security device according to claim 1, wherein said key is made up of a memory chip of 256-bits to lOk-bits or above, magnetic card, RF (radio frequency) card, and IC (integrated circuit) chip having a fingerprint recognition, voice recognition, and password recognition function.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1019980063363A KR100296371B1 (en) | 1998-12-31 | 1998-12-31 | Computer having security device |
| KR1998/63363 | 1998-12-31 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2000041058A1 true WO2000041058A1 (en) | 2000-07-13 |
Family
ID=19569952
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR1999/000772 Ceased WO2000041058A1 (en) | 1998-12-31 | 1999-12-14 | Computer system having a security device |
Country Status (2)
| Country | Link |
|---|---|
| KR (1) | KR100296371B1 (en) |
| WO (1) | WO2000041058A1 (en) |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2008091553A1 (en) * | 2007-01-23 | 2008-07-31 | Hewlett-Packard Development Company, L.P. | Portable computing system docking security system and method |
| WO2008127433A3 (en) * | 2006-11-25 | 2009-03-19 | Clevx Llc | Memory protection system |
| CN100543633C (en) * | 2005-09-23 | 2009-09-23 | 广达电脑股份有限公司 | Portable computer and safety protection method thereof |
| WO2012034453A1 (en) * | 2010-09-14 | 2012-03-22 | 湖南源科高新技术有限公司 | Method for clearing computer data and computer |
| EP2732608A1 (en) * | 2011-07-14 | 2014-05-21 | Qualcomm Incorporated | Method and apparatus for detecting and dealing with a lost electronics device |
| US11444764B2 (en) * | 2019-07-17 | 2022-09-13 | L3Harris Technologies, Inc. | Watchdog key system for data security in unmanned undersea vehicles |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20020001294A (en) * | 2000-06-27 | 2002-01-09 | 김형남 | The prevention of robbed/security method for apparatus thereof |
| KR100464235B1 (en) * | 2001-11-21 | 2005-01-03 | 임병갑 | Fingerprinting mouse consolidated security |
| KR100443203B1 (en) * | 2001-11-22 | 2004-08-04 | 주식회사 알엔디소프트 | Security method for application program using message hooking |
| KR100489793B1 (en) * | 2002-11-15 | 2005-05-16 | 엘지전자 주식회사 | Method and system of warning approach of stranger for computer system |
| KR100988414B1 (en) | 2007-09-07 | 2010-10-18 | (주)밀레니엄 포스 | Data security |
| CN103839014B (en) * | 2014-03-19 | 2017-02-22 | 深圳市亿道信息股份有限公司 | Self-destruction circuit of tablet personal computer storage device |
| CN105657169B (en) * | 2016-01-05 | 2019-02-19 | Oppo广东移动通信有限公司 | A data protection method, device and mobile terminal |
| CN107657183B (en) * | 2017-08-31 | 2020-03-27 | 中国人民解放军海军医学研究所 | Data security protection method and device for electronic equipment |
| KR102905542B1 (en) | 2020-04-22 | 2025-12-31 | 삼성전자주식회사 | Storage device with structure for improving security performance and removing data and method of operating the same |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH08249546A (en) * | 1995-03-08 | 1996-09-27 | Fujikura Ltd | Mobile terminal |
| US5648762A (en) * | 1994-02-04 | 1997-07-15 | Canon Kabushiki Kaisha | Built-in electronic apparatus and device-detaching method therefor |
| KR970067029A (en) * | 1996-03-20 | 1997-10-13 | 김광호 | Portable computer device having a burglar alarm function and its alarm function control method |
-
1998
- 1998-12-31 KR KR1019980063363A patent/KR100296371B1/en not_active Expired - Fee Related
-
1999
- 1999-12-14 WO PCT/KR1999/000772 patent/WO2000041058A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5648762A (en) * | 1994-02-04 | 1997-07-15 | Canon Kabushiki Kaisha | Built-in electronic apparatus and device-detaching method therefor |
| JPH08249546A (en) * | 1995-03-08 | 1996-09-27 | Fujikura Ltd | Mobile terminal |
| KR970067029A (en) * | 1996-03-20 | 1997-10-13 | 김광호 | Portable computer device having a burglar alarm function and its alarm function control method |
Non-Patent Citations (1)
| Title |
|---|
| PATENT ABSTRACTS OF JAPAN vol. 1997, no. 01 * |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100543633C (en) * | 2005-09-23 | 2009-09-23 | 广达电脑股份有限公司 | Portable computer and safety protection method thereof |
| WO2008127433A3 (en) * | 2006-11-25 | 2009-03-19 | Clevx Llc | Memory protection system |
| WO2008091553A1 (en) * | 2007-01-23 | 2008-07-31 | Hewlett-Packard Development Company, L.P. | Portable computing system docking security system and method |
| GB2458849A (en) * | 2007-01-23 | 2009-10-07 | Hewlett Packard Development Co | Portable computing system docking security system and method |
| US7993414B2 (en) | 2007-01-23 | 2011-08-09 | Hewlett-Packard Development Company, L.P. | Portable computing system docking security system and method |
| GB2458849B (en) * | 2007-01-23 | 2011-09-14 | Hewlett Packard Development Co | Portable computing system docking security system and method |
| WO2012034453A1 (en) * | 2010-09-14 | 2012-03-22 | 湖南源科高新技术有限公司 | Method for clearing computer data and computer |
| EP2732608A1 (en) * | 2011-07-14 | 2014-05-21 | Qualcomm Incorporated | Method and apparatus for detecting and dealing with a lost electronics device |
| US9954829B2 (en) | 2011-07-14 | 2018-04-24 | Qualcomm Incorporated | Method and apparatus for detecting and dealing with a lost electronics device |
| US10009323B2 (en) | 2011-07-14 | 2018-06-26 | Qualcomm Incorporated | Method and apparatus for detecting and dealing with a lost electronics device |
| US11444764B2 (en) * | 2019-07-17 | 2022-09-13 | L3Harris Technologies, Inc. | Watchdog key system for data security in unmanned undersea vehicles |
Also Published As
| Publication number | Publication date |
|---|---|
| KR19990037629A (en) | 1999-05-25 |
| KR100296371B1 (en) | 2001-08-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2000041058A1 (en) | Computer system having a security device | |
| US10713343B2 (en) | Methods, devices and systems for authenticated access to electronic device in a closed configuration | |
| US20030014660A1 (en) | PC card security system | |
| US8634808B1 (en) | Mobile device loss prevention | |
| US8019131B2 (en) | Authentication apparatus and method, and electronic device using the same | |
| US20070136593A1 (en) | Secure information storage apparatus | |
| WO2005081197A1 (en) | Information processing device and method for preventing theft of the information processing device | |
| JP2000235427A (en) | Portable electronic device key | |
| US20080122801A1 (en) | Electronic devices having a touch screen and method for starting the electronic devices | |
| JP3467248B2 (en) | Computer automatic recognition system using IC card | |
| US6294995B1 (en) | Anti-theft alarm for portable computer | |
| US20070030257A1 (en) | Locking digital pen | |
| US20020095608A1 (en) | Access control apparatus and method for electronic device | |
| JP2000172960A (en) | Theft-preventing device for portable electronic device | |
| JP2000315120A (en) | Information processing apparatus, information processing method, and storage medium storing information processing program | |
| US20020169989A1 (en) | Method and apparatus for access security in computers | |
| US11836561B2 (en) | Key fob duplication device | |
| JPH09185554A (en) | Information protection device | |
| JP2001291050A (en) | Card reader provided with security function | |
| JP2011107956A (en) | Computer system | |
| US20070143627A1 (en) | Input device and password control method used therein | |
| JPH08249546A (en) | Mobile terminal | |
| JP2001331235A (en) | Information processing device | |
| US20090212949A1 (en) | Alarm, and detection and alarming method thereof | |
| CN101441496B (en) | Portable computer device and anti-theft method thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA CN JP US |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| 122 | Ep: pct application non-entry in european phase |