Method for automatically verifying security code of computer system operated by remote controller
First Claim
1. A method for automatically verifying a security code set in a computer whose operations are controlled by a remote controller, the method comprising the steps of:
- pressing a button on an input device;
transmitting said security code data to said computer;
checking whether the set security code is matched with the transmitted security code; and
if matched, converting an operation mode of the computer into a normal mode.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer system includes a remote controller for generating a remote control signal to remotely control operations of the system, a remote control signal receiver for receiving the remote control signal generated from the remote controller, and a shell program for executing various remote control operations by the remote controller. If a security code verification operation is performed when the computer system returns from a stand-by state to a normal state by the remote controller, the shell program serves to automatically input a security code transmitted from the remote controller. This makes it possible to automatically input a security code that a user must directly input using an input device such as a keyboard, when the computer system returns to the normal state. Therefore, user convenience can be enhanced.
-
Citations
18 Claims
-
1. A method for automatically verifying a security code set in a computer whose operations are controlled by a remote controller, the method comprising the steps of:
-
pressing a button on an input device;
transmitting said security code data to said computer;
checking whether the set security code is matched with the transmitted security code; and
if matched, converting an operation mode of the computer into a normal mode. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for automatically verifying a security code of a multi-user computer via one of a plurality of cordless remote controllers, the method comprising the steps of:
-
operating one of said plurality of remote controllers to turn on and boot said computer;
waiting a predetermined period of time for said computer to lapse into a stand-by mode;
pushing a button on one of said plurality of remote controllers to attempt to bring said computer to a normal mode;
transmitting a password to said computer from said remote control device that attempted to bring said computer back to a normal mode;
determining whether the remote controller used to attempt to bring said computer to a normal mode is the same remote control device that booted said computer;
bringing said computer back to a normal mode if said remote control device used to bring the computer back to a normal mode is the same remote control device used to boot the computer; and
rebooting said computer and repeating all of the above steps if the remote control device used to bring said computer to a normal mode is different from the remote control device used to boot the computer. - View Dependent Claims (11, 12)
-
-
13. A computer being operated by a remote control device, said remote control device transmitting security information to said computer to activate said computer, said computer comprising:
-
a remote control signal receiver for receiving signals from said remote control device;
a shell program for handling and transmitting said received signals from said remote control device; and
a general purpose input/output unit connected between said receiver and said shell program to facilitate communication therebetween. - View Dependent Claims (14, 15)
-
-
16. A method for resuming normal operation of a computer when a computer is in a standby mode, said method comprising the steps of:
-
determining whether or not there has been any input to said computer for a predetermined period of time;
performing a screen save function;
switching said computer from a normal operation mode into a standby state;
pushing a button on a remote wireless device;
transmitting security data from said remote device to said computer;
checking whether the security data transmitted from said remote wireless device matches security data stored within said computer; and
reviving said computer from said standby mode to a normal operation mode if said security data input from said remote wireless device matches said security data stored within said computer. - View Dependent Claims (17, 18)
-
Specification