200416552 (1) 玖、發明說明 【發明所屬之技術領域】 本發明有關於,用於實施:以電腦等之所謂“螢幕保 護”(S c r e e η - S a V e r )功能所代表之爲了實施保全(保密及 安全)(Security )功能用之裝置。 【先前技術】 爲了預防連接於電腦等之顯示器之燒損,在於電腦上 很多都是導入有,某一定時間內沒有存取時消去畫面或顯 示出預定之插圖或其他等之程式。這種一般係稱爲螢幕保 護。 再加上,由螢幕保護處理而復歸於通常之狀態時要求 輸入“密碼”,如果未能輸入正之密碼時即不能解除螢幕保 護之狀態,乃屬於習知(例如參照日本專利公報特開平 09-297676號)。 在於螢幕保護上附加藉“密碼”之鎖定而可抑制具有正 常之權限之使用者以外者之在於使用者之不在時存取於電 腦之情形。 惟在已存之螢幕保護組件乃,需要經過一定之待命時 間爲止,螢幕保護不會啓動,再者,以手動來啓動螢幕保 護時須經過複數之程序。換言之爲了以使用者所欲之時機 地啓動螢幕保護時,被要求煩雜之操作,這件事在於特別 是發生急時而使用者需立即離席時成爲問題。 如果由於操作太煩雜,而不啓動螢幕保護地離席時即 -5- (2) (2)200416552 在於經過規定之時間內,成爲使用者以外之人得自由地存 取於電腦之狀態由而成爲無法擔保保全(保密·安全)之 狀態。 本發明係對於上述之課題首先地著目者。提供一種不 會隨伴煩雜之操作,而在於必要時可以啓動,以螢幕保護 所代表之保全功能爲目的。 【發明內容】 1 鑒於上述之問題,本發明係如第1 8圖所示,構成了 具有有:用於檢測有無人之存在之感測手段1 0,及以上述 感測手段1 0之檢測出使用者之離席爲條件,而開始實施預 定之保全功能之控制手段π,及在於由上述控制手段1 1之 保全功之已啓動之狀態下,用於認證回來的人係具有正當 之權限之使用者之認證手段1 3,及在於由上述認證手段1 3 之認證之完了後,解除由上述控制手段之保全功能之控制 之解除手段1 4而構成之資訊處理裝置。 換言之,採取感測出使用者之在席/離席,當使用者 離席時,立即可以啓動規定之保全功能,而在於已啓動保 全功能之狀態下,欲解除該狀態時,需要有使用者認證之 系統。 如這種構成時,使用者離席時不需要實施逐一之煩雜 之操作也可以擔保不在時之保全。 本發明所欲實現之保全功能可以想定有很多種。惟, 其典型乃,防止收納於個人電腦等之資訊之不正常之閱覽 -6- (3) (3)200416552 ,防止對於個人電腦等之不正當之操作等等。所以上述控 制手lx 1 1係以保全功能而得實施秘匿(隱藏)顯示於晝面 之資訊之處理,或拒絕由具有正當之權限之使用者以外之 者之操作爲宜。 如第1 0圖所示,在於關於以文字、畫像、影像,或這 些之結合地得顯示資訊於顯示器之畫面之資訊處理裝置中 ,使之成爲具備有:用於檢測有無人存在之感測手段〗0, 及至少具有實施爲了秘匿顯示於畫面之資訊用之畫面處理 之功能之控制裝置1 1,及當介著上述感測手段1 0感測出, 該利用該資訊處理裝置之使用者之離席時,啓動藉上述控 制手段1 1之畫面處理之控制啓動手段1 2,及在於由上述控 制手段1 1之畫面處理在於啓動之狀態下,用於認證欲利用 該資訊處理之人爲具有正當之權限之使用者之事實之認證 手段1 3 ’及在於由上述認證手段1 3之認證完了之後,實施 解除藉由上述控制手段之畫面處理之控制之解除手段1 4而 構成之資訊處理裝置時,即使用者之離席時,可以秘匿該 控制手段1 1之畫面處理之啓動中之資訊之內容,並且在於 啓動畫面處理之狀態下,認證了具有正當權限之使用者之 復歸之事實後,解除上述之畫面處理,再度成爲可以顯示 ,於是成爲可以抑制由他人之不正當之資訊閱覽而可以擔 保保全。 又,所謂畫面處理乃指,爲了秘匿(隱藏)顯示於畫 面之資訊之畫面顯示處理,或實施消去畫面處理而言。 同樣地在於可以實施種種之資訊處理之資訊處理裝置 (4) (4)200416552 中,使之成爲具備有:用於檢測有無人之存在之感測手段 1 〇 ’及至少具有爲了實施資訊處理之操作之接受之留保之 留保處理之功能之控制手段1 1,及當介著上述感測手段感 測器了利用該資訊處理裝置之使用者之離席時,啓動藉由 上述控制手段1 1之留保處理之控制啓動手段1 2,及在於藉 由上述控制手段1 1之留保處理之已啓動之狀態下,用於認 證欲使用該資訊處理裝置者係具有正當權限之使用者之認 證手段1 3,及在於藉由上述認證手段1 3之認證完了後,解 除由上述控制手段之留保處理之控制之解除手段1 4,而構 成之資訊處理裝置也可以,不需要對於使用者本身強求煩 雜之操作地,可以抑止由他人之不正當之存取,而擔保其 保全。 所謂資訊處理係指,包括資訊之閱覽或視聽、製作、 變更、保存,發訊·接受以及其他各種程式之實施等等之 槪念。 本發明所欲實現之保全功能之其他之例乃指,可能收 納種種物品之收納具,(本案所指之收納具係包含可以收 納物品之所有之器具之槪念,例如可以包含桌子之抽屜、 車輛、物品櫃、收容箱、皮包等),而抑制第三者之開閉 該收納具而言。 此時之控制手段1 1乃,做成爲用於實施爲了擔保,可 能收納種種物品之收納具之開閉之保全之功能。 上述控制之解除手段1 4乃,在於由上述認證手段1 3之 認證之完了時,對於上述控制手段1 1送訊該爲了解除該保 -8- (5) (5)200416552 全功能用之操作訊號之資訊處理裝置。 按控制手段11所貫施之保全功能乃,在於具有正當之 權限之使用者之離席之狀況下’換言之,抑止使用者離開 收納具之傍之狀況下,由該使用者以外之實施收納具之開 閉之處理。更具體的說: (1 ) 物理的抑制收納具之開閉之處理(上鎖,電 氣柵等通電等)或, (2 ) 感測出對於收納具之不正當操作時發出警報 處理(通於使用者或其他人做通報,對於不正當行爲者之 威嚇用之警報等等),均屬之。而控制手段11之具體內容 乃成爲回應於所實施之保全功能之內容。 此種方式者時’由於可以抑制,當使用者離席之間, 有他人不正當地拿出收納具內之物品,或閱覽之情形。因 而安全的可以將有被偷竊之可能之貴重品,或欲避免他者 閱覽之機密文件或其他物品收納於收納具而予以保管。 上述之控制手段係對於收納具而裝卸自如之構成亦可 以。 如果係採用裝卸自如之方式時,使用者可以任意地安 設於本身所使用之桌子之抽屜、或皮包等而可提高保全性 〇 再者採用如第1 9圖所示之構成,即具備有:用於檢測 有無人之存在之感測手段1 〇,及對於設置於可能收納種種 之物品之收納具之上鎖裝置而可能送訊爲實施該上鎖或解 鎖用之操作訊號之訊號發訊手段1 5,及用於認證’該離席 -9- (6) (6)200416552 後回席者係且有正當之權限之使用者之認證手段1 3而構成 ,上述訊號發訊手段1 5乃,當介著上述感測手段1 〇而感測 出上述使用者之離席時,發訊該實施上述上鎖裝置之上述 操作訊號,且當藉上述認證手段13完了後,發訊該爲了解 鎖該上述上鎖裝置之操作訊號而構成之資訊處理裝置。也 同樣可以構成簡便之保全系統。 再者,如上鎖裝置係只在於接受爲了解鎖之操作訊號 之間,成爲解鎖狀態(不能接受(受訊)爲了解鎖之操作 訊號時,即採取移行於上鎖狀態)之方式時,即上述訊號 發訊手段1 5之介著感測手段1 0而感測出使用者之離席時, 停止操作訊號之發信,然後藉由認證手段1 2而做了具有正 當權限之使用者之認證時,將再開操作訊號之發訊之方式 也。 又,如第11圖所示。該可以實施上述之畫面處理及/ 或留保處理之資訊處理裝置乃再具備有,對於設置於可能 收納種種物品之收納具之上鎖裝置得發訊該爲了實施該上 鎖或解鎖用之操作訊號之訊號發訊手段1 5爲宜。 上述訊號發訊手段1 5乃,當介著上述感測手段1 〇感 測出,利用該資訊處理裝置之使用者之離席時,發訊該爲 了實施上述上鎖裝置上鎖用之操作訊號,且在於由上述認 證手段1 3之認證完了之後,發訊爲了實施上述上鎖裝置之 解鎖用之操作訊號而構成。此時一方面可以防護收納於個 人電腦等之數値資訊,以及圖保管於收納具內之文畫等之 「對話」資訊之防護也。 -10 - (7) (7)200416552 又,如第2 0圖所示使之再具備有:至少感測出,藉由 上述認證手段1 3之使用者認證手段1 3之使用者認證失敗之 事實,或不經過上述認證手段1 3之使用者認證而對於收納 具施予操作之事實之任一方時,生成關於該事實之資訊而 輸出之不正當存取資訊輸出手段1 6而構成時’可能做到, 對於個人電腦或收納具之關於由第三者之不正當行爲之資 訊發訊於規定之收訊地址發訊而通報該不正當之事實。或 蓄積關於不正當行爲之資訊而供事後之參照。 按所謂由認證手段1 3之使用者認證之失敗係指,對於 取得識別具有正當之權限之使用者之使用者識別資訊之失 敗而言。 如認證手段1 3之係接受由使用者之使用者識別資訊之 接受該輸入之態樣之下實施使用者認證時即以規定次數之 輸入錯失做爲失敗於使用者認證爲通例。 再者,在於既存之螢幕保護模組中,爲了將解除螢幕 保護之通語輸入之對話顯示於畫面起見,須要移動滑鼠, 或按下鍵等。此操作乃只有停止螢幕保護,輸入對話之顯 示以外並無其他意義,只是對於使用者而言增加麻煩而已 〇 相對的,將上述認證手段1 3做成爲,介著感測手段1 〇 而感測出任何人接近時,對於該人發出督促,輸入識別具 有正當之權限之使用者之識別資訊之指示,同時,可接受 該輸入之構成時即可以省略上述之操作。或將上述認證手 段1 3做爲:對於記憶有欲利用該資訊處理裝置者所具有之 -11 - (8) (8)200416552 用於識別該者之使用者識別資訊之規定之記憶裝置實施無 線通訊,而由上述規定之記憶裝置取得使用者識別資訊, 而將它與用於識別該具有正當之權限之使用者時,就可以 省略由使用者本身之使用者識別資訊之輸入操作而可以成 爲更爲使用上方便之方式。 又,所謂「規定之記憶裝置」乃一般係指,具有記憶 使用者識別資訊之功能,以及將記憶之使用者識別資訊予 以無線發訊之功能者而言。例如RFID ( Radio FreqUeney IDentification:對於卡狀或標籤狀等之記錄媒體,使用電 磁波實施資訊之記錄或讀出之認識方法),具備有標_, 或無線通訊裝置之可攜帶之資訊終端機,或攜帶電話終端 機等係該當於它者。 【實施方式】 <第一實施形態> 參照附圖來說明本發明之實施形態。本實施形態之資 訊處理裝置係,例如第1圖所示,包含有:處理器1 a,主 記憶器1 b,補助裝置1 c,顯示器丨d,顯示控制裝置! e,以 及介著輸入出接口 lh而連接之輸入裝置,人感感測器lg 等之硬體資源,而以既有之個人電腦、工作站、PDA ( Personal Digital Assistants)等,將資訊以文字畫像、影 像或這些之結合地顯示於畫面,以及可以實施種種資訊處 理地予以構築。 補助記憶裝置1 c係例如硬碟驅動器、快閃記憶體、 -12- (9) (9)200416552 DVD-ROM等之光碟驅動器、其他者,而可以由資訊處理 裝置裝卸自如者,換言之,卡匣式之記憶卡、非接觸1(:卡 、或外附裝式之碟片驅動器等亦無妨。 顯示控制裝置1 e係具有:依據由處理器1 a所接受之描 mi日不而生成應威不之畫像資料而朝向顯不器id送出之功 能之視頻片1 e 1 (或圖像片),擔負暫時地收納畫像資料 等之職務之視頻記憶體le2 ( Video RAM )等習知之裝置 來構成。 輸入裝置1 f係使用者之使用於操作輸入者,可由鍵盤 、潸鼠、磁道墊(T r u c k p a d )等所代表。 人感感測器1 g係,擔負檢測出在該資訊處理裝置近傍 之規定領域內,有無人之存在之感測手段1 〇之職務。做爲 人感感測器1 g,可以採用種種之方式。檢測出由人體所發 出之紅外線之無源I R感測器係典型的人感感測器1 g,惟 使用無源IR感測器以外之方式也可以。例如感測器手段 1 〇係攝影器攝影周邊領域而由解析該畫像來檢測出有無人 之存在之方式亦可用。 通常,由處理器1 a所應實施之程式係收納於補助記憶 裝置1 c,在實施程式時,從補助記億裝置1 c讀取於主記憶 器1 b,由處理器1 a所解讀,並且依該程式啓動上述之硬體 資源,使之發揮第2圖所示之控制手段1 1 ’控制起動手段 1 2,認證手段1 3,控制之解除手段1 4之功能。 控制手段1 1係具有:用於實施秘匿(隱藏)顯示於畫 面之資訊之畫面處理之功能,及實施留保爲了實施資訊處 -13- (10) (10)200416552 理之操作之接受之留保處理之功能。控制手段11係例如可 以習知之螢幕保護模組程式來構成。藉由啓動螢幕保護模 組程式就可以秘匿現正顯示之畫面而且留保操作之接受。 又於第3圖例示顯示器1 d上之資訊之顯示畫面’同時將秘 匿了第3圖所示之顯示畫面之狀態顯示(例示)於第4圖 。按做爲由控制手段1 1之畫面處理之態樣之一而可以採取 顯示器1 d之電源〇 F F之方式’換言之可採取將顯示器息燈 之方式。 控制啓動手段1 2係,當介著人感感測器1 g感測出’ 現在利用該資訊處理裝置之使用者之離席’換言之使用者 之離開資訊處理裝置之傍時,啓動藉由上述控制手段1 1之 畫面處理及留保處理。控制手段1 2係例如以計時器計數該 人感感測器1 g之沒有檢測出使用者之存在之經過時間’而 該經過時間超過預定之到達時間時’判斷爲使用者已離席 而啓動藉控制手段1 1之控制。 認證手段1 3乃,在於藉由控制手段1 1之畫面處理及操 作之接受之留保之啓動之狀態下,認證,該利用該資訊處 理裝置者是否具有正當之權限之使用者之事實。該認證係 例如以對於欲利用該資訊處理裝置者而要求輸入,用於識 別具有正當權限之使用者之使用者識別資訊之態樣地予以 實施。 有關於,具有正當之權限之使用者,使用者識別資訊 乃預先(以平文或加密)收納於主記憶器1 b或補助記億裝 置1 c之規定之記憶領域,或通訊可能地連接於該資訊處理 -14- (11) 200416552 裝置之規定之電腦(不圖不)之主記憶器或補助記 之規定領域。而認證時係介著輸入裝置! £而與被輸 用者識別資訊予以比較。在於本實施形態中,使用 資訊乃採用介著輸入裝置1 f輸入該使用者】D及/或 方式。關於使用者ID及/或密碼乃現在之利用該資 裝置之使用者帳目之I D或密碼相同或不同也可能。 用者識別資訊也不使用者I D、密碼,所以例如依據 之身體的特徵之生化計測資料(例如:指紋、聲紋 、網膜之圖樣、虹彩之圖樣、血管之圖樣)做爲使 別資訊而實施生化計測認證也可以。此時乃在於資 裝置上預先設置用於輸入生化計測資料之裝置。當 手段1 3係倂用複數之方式來實施認證也可以。 再者,該認證手段1 3乃,當在於由上述控制手 畫面處理及留保處理之啓動之狀態下,介著人感感 感測出有人之接近時,對於該人發出,輸入具有正 限之使用者之使用者識別資訊之指示,同時可以接 入之方式爲宜。督促使用者識別資訊之輸入之指示 種種之使用者接口而以畫面顯示,聲音輸出,以及 式之態樣而賦予。本實施形態係採用:在於顯示器 示要求輸入使用者識別資訊:使用者ID及/或密碼 接受其輸入之方式。 在於第5圖例示要求使用者ID及/或密碼之輸入 之顯示。 控制之解除手段1 4乃,在於由該認證手段1 3之 憶裝置 入之使 者識別 密碼之 處理 但是使 使用者 '筆跡 用者識 δ 處理 然認證 段1 1之 測器1 g 當之權 受該輸 乃介著 其他方 Id上顯 ,同時 之對話 認證之 -15- (12) (12)200416552 完了後,解除由控制手段1 1之畫面處理及留保處理。本實 施形態乃依據螢幕保護程式來解除螢幕保護功能而回復顯 示資訊之畫面,再開始接受操作。 但是不會妨礙,控制手段Π,控制啓動手段1 2,認證 手段1 3,以及控制之解除手段1 4之各部之功能之被分擔於 複數之裝置而由這些之協助動作而成立爲上述資訊處理裝 置之情形也。 下面對於感測手段1 〇做補充說明。按無源IR感測器係 ,經由檢測出動體之變位來檢測出其存在者,所以如果使 用者係實施身體之動作少之作業或在休息時等即無法安定 的檢測出其存在。做爲對處此問題之方法可以考慮採用無 源IR感測器(焦電型人感感測器)及距離感測器(反射型 )之二個感測器之組合之感測手段1 0。前者係檢測出在於 檢測範圍內之使用者之身體或其他物體之動作。後者係檢 測出在於檢測範圍內之使用者或其他物體之存在。第2 1圖 表示組合了這些感測器之感測手段1 〇之電路構成圖。第2 2 圖表示爲了說明感測手段1 〇之動作之時序表。 無源IR感測器乃檢測出即成爲〇N ( HI )之輸出。基 本上,無源IR感測器之輸出或距離感測器之輸出爲Ο N時 ,即可以判斷爲使用者正在座席上。而無源1R感測器之輸 出及距離感測器之輸出均顯現〇FF ( L0 )時即可以判斷爲 使用者已離席。但是由兩感測器之輸出均顯現0 F F到經過 預定之保持時間爲止,使感測手段1 〇之輸出係維持顯不使 用者在於在席狀態爲宜。換言之第21圖之正反器係直到經 -16- (13) (13)200416552 過了保持時間爲止,保持表示在席之意思之(H 1 )狀態。 保持時間之經過後才切換爲表示使用者離席之意思之( LO )之狀態,但是將保持時間設定爲零(〇 )也無妨。並 且,在於檢測出使用者之離席之後,再能判斷爲該使用者 或並非使用者之復席之判斷之條件爲,規定爲無源IR感測 器之輸出及距離感測器之輸出之兩者均呈顯(0N )之情 形。按使用者或非使用者再度座上原來之座席時’無源IR 感測器不可能會感測不到之情形,又,如果不倂用距離感 測器時,很難判斷是座席與走過傍之人之緣故。 又如上述,感測手段1 〇乃不侷限使用人感感測器1 g, 惟做爲其特別的例子,而可舉出在於使用者所使用之傢倶 或雜器上設置了感測器之態樣。具體的例子乃’在於桌子 之天板設置起於人體之靜電或溫度等之感測器’或椅子之 靠背或扶手上設置感壓感測器等等。此時當地也是將介著 有線或無線而將感測器所輸出之訊號,由資訊處理裝置來 接受。 下面參照第6圖之流程圖說明本實施形態之資訊處理 裝置所實施之處理之程序。 當介著人感感測器1 g感測出,利用該資訊處理裝置 之使用者離席時(步驟si)。啓動由控制手段11之畫面處 理(步驟S2 ),且啓動由控制手段1 1之留保處理(步驟S3 )。並且,在於由控制手段1 1之畫面處理及留保處理之啓 動之狀態下,介著人感感測器1 g感測出有任何人接近於 該資訊處理裝置之情形時(步驟S 4 )’對於該人發出督促 -17· (14) 200416552 輸入用於識別具有正當權限之使用者之使用者識 指示(步驟S 5 ),且接受使用者識別資訊之輸入 )。如前述之在於本實施形態乃,在於上述步驟 於顯示器1 d之畫面上顯示該使用者識別資訊之使 /或密碼之輸入對話D。由而接受使用了輸入裝置 者ID及/或密碼之輸入。由上述之人完成了使用 訊之輸入之後(步驟S 7 ),實施比較所輸入之使 資訊及預先收納之具有正當權限之使用者之使用 訊,而實施使用者之認證。當如果能夠認證,欲 訊處理裝置者係具有正當之權限之使用者時(步 解除由控制手段1 1之畫面處理(步驟S 9 )。且解 手段1 1之留保處理(步驟S 1 0 )。 在於上述步驟S 8中不能認證係具有正當權限 時,係再度督促輸入使用者識別資訊之輸入。按 於第6圖上沒有表示,惟當顯示輸入對話D,而 使用者ID、密碼時(步驟S 5、步驟S 6 ),並沒有 經過了預定之定時時間,或在於輸入對話D內所 取消」按鈕之被按下時,將消去輸入對話D而復 螢幕保護了狀態。即回復於實施上述之步驟S2, 階段之處理亦可以。 依本實施形態乃,由於構成了具備有:用於 人之存在之感測手段1 〇 (人感感測器1 g )及,以 感測器1 g之檢測出使用者之離席爲條件,而開始 之保全功能即實施畫面處理及/或留保處理之控 別資訊之 (步驟S 6 S5中,在 用者1 D及 1 f之使用 者識別資 用者識別 者識別資 利用該資 驟 S 8 ), 除由控制 之使用者 ,雖然在 等候輸入 被輸入而 配置之「 原爲啓動 步驟S 3之 檢測有無 上述人感 實施預定 制手段1 1 -18- (15) (15)200416552 ,及在於由上述控制手段1 1之保全功能之已啓動之狀態下 ,用於認證回來的人係具有正當之權限之使用者之試證手 段1 3,及在於由上述認證手段1 3之認證之完了後,解除由 上述控制手段1 1之保全功能之控制解除手段1 4而構成之資 訊處理裝置。 所以使用者本身不需要實施煩雜之操作之下,當使用 者離開其座席時,會啓動由控制手段1 1之保全功能。且保 全功能之啓動之下,實施認證具有正當權限之使用者之復 歸之後,實施該解除,所以成爲抑制由不正當存取而成爲 可以擔保保全之裝置。 又,將資訊做爲,文字、畫像、影像或這些之結合而 可顯示於顯示器Id之畫面之資訊處理裝置,構成爲,具備 有: 用於檢測出有無人之存在之感測手段1 0 (即人感感測 器1 g ),及至少具有實施秘匿(隱藏)顯示於畫面之資訊 之畫面處理之功能之控制手段11,及當介著人感感測器1g 感測出,利用該資訊處理裝置之使用者之離席時,啓動由 上述控制手段1 1之畫面處理之控制啓動手段1 2,及由上述 控制手段Π之畫面處理之啓動之狀態下,用於認證欲利用 該資訊處理裝置者係具有正當之權限之使用者之認證手段 1 3,以及由上述認證手段1 3之認證之完了後,解除由上述 控制手段1 1之畫面處理之控制之解除手段1 4,所以使用者 本身不需要實施煩雜之操作之下’當使用者離席時,由控 制裝置1 1之畫面處理啓動而可以秘匿資訊之內容。並且在 -19· (16) (16)200416552 於啓動畫面處理之狀態下,實施具有正當權限之使用者之 復歸之認證之後,才解除畫面處理,使之能再度可能顯示 資訊,由而抑制由他人之不正當之資訊之閱覽,成爲可以 擔保保全之裝置。 同樣,將可以施行各種資訊處理之資訊處理裝置構成 爲:具備有:用於檢測有無人存在之人感感測器1 g,及至 少具有留保爲了實施資訊處理之操作之接受之留保處理之 功能之控制手段1 1,及介著上述人感感測器1 g而感測出利 用該資訊處理裝置之使用者之離席時,啓動由上述控制手 段1 1之留保處理之控制啓動手段1 2,及在於由上述控制手 段1 1之留保處理之在啓動之狀態下,認證欲利用該資訊處 理裝置者係具有正當權限之使用者之認證手段1 3,以及當 由上述認證手段1 3之認證之完了後,解除該由控制手段1 3 之留保處理之控制解除手段1 4。所以使用者本身不需要實 施煩雜之操作,使用者離席時由控制手段1 1實施接受操 作之留保。並且,認證了具有正當權限之使用者之復歸( 回座)而解除接受操作之留保,由而抑制由他人之不正當 之存取成爲可以擔保保全之裝置。 再者,上述認證手段13乃,由於介著人感感測器lg而 感測出有人接近時,對於該人發出督促具有正當權限之使 用者之識別用之使用者識別資訊之輸入之指示,同時可以 接受該輸入而構成者,所以可以省略,爲了停止螢幕保護 ,及顯示輸入對話D用之按鍵之按下,滑鼠之移動等等之 煩雜之操作也。 -20- (17) (17)200416552 所以’在於本實施形態之資訊處理裝置乃在於不特定 之人之手之能涉及之狀態下之利用上很合宜,特別是在於 業務員之隨時可進駐之暫時之辦公桌、網咖、等場所而很 合宜(安全)的利用。 <第2實施形態> 接著說明之第2實施形態係,在於資訊處理裝置1上有 螢幕保護啓動之狀態下,換言之,上述畫面處理,上述留 保處理之啓動狀態下,爲了認證欲利用資訊處理裝置1之 人係具有正當的權限之使用者之方法。而替代於第7圖而 模式的顯示的,由使用者所預先所持有之規定之記億裝置 Μ而無線接受(受訊)使用者識別資訊之方式。下面針對 與上述第1實施形態之不同點爲中心加以說明。 本實施形態乃做爲規定之記憶裝置Μ而使用RFID標誌 〇 按RFID標誌係得以無線通訊,以非接觸而可能實施 資料之讀取或改寫之記錄媒體。RFID之方式可以舉出: 電磁感應方式(利用電磁感應作用,一面對於RFID標誌 供給電力一面與RFID標誌交訊之方式),微波方式(使 用微波帶而與RFID標誌交訊之方式)。光方式(使用紅 外線等之光波而與RFID標誌交訊之方式’以及其他之方 式。關於採用那一種方式即不做限定。按爲了防止遺留, 而將規定之記憶裝置Μ,例如做成胸章等可以帶於身上即 合宜。但是,規定之記憶裝置Μ不限於RFID ’也可採用具 -21 - (18) (18)200416552 有無線通訊功能之可攜帶之資訊處理終端機,特別是如具 備藍芽(商標)等資料通訊用對講機之手機終端機等做爲 規定之記憶裝置Μ也可以。並且在此規定之記憶裝置μ上 ,預記憶該所持之使用者之識別用之使用者識別資訊。 另一方面,本實施形態之資訊處理裝置〗乃,例如第】 圖所示,將成爲內包含有:處理器〗a,主記憶器丨b,補助 記憶裝置1 c,顯示器1 d,顯示控制裝置1 e,及介著_入出 接口 1 η連接之輸入裝置1 f,人感感測器1 g等之硬體資源 ’加上爲了與上述規定之記憶裝置Μ實施無線通線用之 無線通訊裝置Π。 關於無線通訊裝置1 i之具體的態樣乃係成爲回應於使 用者所具有之規定之記憶裝置Μ之態樣。舉例說明之,如 果規定之記憶裝置Μ係電子感應方式之RFID標誌時,將成 爲使對於該R FI D標誌內之感應線圈會產生感應電壓之線 圈(天線)。而規疋之5己憶裝置Μ係光方式之RFID時即成 爲將含有與該RFID實施紅外線通訊之紅外線裝置。 通常應由處理器1 a所實施之程式係收納於補助記憶裝 置1 c ’實施程式時,由補助記憶裝置1 c讀取於主記憶器i b ο 而以處理器1 a來解讀。並且依照該程式啓動上述之硬 體資源’而發揮做爲第2圖所示之控制手段1 1,控制啓動 手段1 2,認證手段1 3,控制之解除手段1 4之功能。 由於控制手段1 1 ’控制啓動手段以及控制之解除.手段 14乃得與上述第1實施形態者同樣地構成,所以在本例中 -22- (19) (19)200416552 省略其詳細說明。 認證手段1 3乃,在於由上述控制手段1 1之畫面處理, 及操作之接受之留保係已啓動之狀態下,認證,欲利用該 資訊處理裝置1者之具有正當之權限之使用者之事實。該 認證乃’從欲利用該資訊處理裝置!之人所持用之規定之 記憶裝置Μ而取得使用者識別資訊,而以此來與用於識別 具有正當之權限之使用者之使用者識別資訊比較之態樣來 實施。 有關於具有正當之權限之使用者之使用者識別資訊係 ’預先(以明文或密碼化)收納於,主記憶器1 b或補助記 憶裝置1 c之規定之記憶領域內,或預先收納於,與該資訊 處理裝置1可以通訊地被連接之規定之電腦(不圖示)之 主記憶器或補助記憶裝置之規定之記憶領域。而認證手段 1 3係利用無線通訊裝置1 1而與上述規定之記憶裝置Μ實 施無線通訊接受記憶於該規定之記憶裝置Μ之使用者識別 資訊。 但是不會妨礙,控制裝置1 1,控制啓動手段1 2,認證 手段1 3,以及控制之解除手段1 4之各部份之分擔爲複數之 裝置,而由這些之協同動作而成立爲上述資訊處理裝置1 之情形。 再者,如果站於,規定之記憶裝置乃與使用者在一起 爲前提之下,檢測出有無規定之記憶裝置·Μ之存在,乃與 檢測出使用者之有無存在之情形即成爲同義。所以令用於 檢測出人之存在之感測手段1 0與用於使用者認證之認證手 -23- (20) (20)200416552 段1 3係共用同一硬體資源也可行。換言之,並非利用人禪、 感測器1 g來構成感測手段1 〇,而是利用與規定之記憶裝置 Μ實施無線通訊之無線通訊裝置1丨而構成感測手段】〇, 當與規定之記憶裝置Μ之通訊斷絕時,認定爲使用者不存 在(不在席)’通訊之確立之狀態即可以認定爲使用者係 存在。此時,規定之記憶裝置Μ及無線通訊裝置〗丨將是構 成本發明之感測手段1 〇及認證手段1 3之要素。又人感感測 器lg即成爲不需要。 下面參照第9圖之流程圖,說明本實施形態之資訊處 理裝置1所實施之處理之程序。 當感測手段1 〇感測出,利用該資訊處理裝置】之使 用者之離席時(步驟S11) ’啓動由控制手段π之畫面處 理(步驟S 1 2 ),且啓動由控制手段1 1之留保處理(步驟 S 1 3 ) 〇 於是在於控制手段12之畫面處理及留保處理之已啓動 之狀態之下,欲利用該資訊處理裝置1者乃以其所持用之 規定之記憶裝置Μ之間來欲建立無線通訊。而與規定之記 憶裝置Μ之間,建立了無線通訊時(步驟S 1 4 ),就可以 取得記憶於規定之記憶裝置Μ之使用者識別資訊(步驟 S 1 5 ),而將取得之使用者識別資訊,與預先收納之關於 具有正當權限之使用者之使用者識別資訊做比較而實施使 用者認證。如果能認證欲利用該資訊處理裝置1者係具有 正當權限之使用者時(步驟S 1 6 ),即解除由控制手段;[i 之畫面處理(步驟S 1 7 ),且解除由控制手段1 1之留保處 -24- (21) (21)200416552 理(步驟S 1 8 )。 在於上述步驟S 1 6而未能認證具有正當之權限之使用 者之情形時,即不實施畫面處理及控制處理之解除’復原 螢幕保護之啓動狀態。換言之回到上述之步驟S 1 2 ’步驟 s 1 3之階段。 依本實施形態乃,由於構成了具備有,用於檢測有無 人存在之感測手段1 〇之人感感測器1 g ’及以上述人感感測 器1 g之檢測出使用者之離席爲條件地開始實施規定之保全 功能,即畫面處理及/或留保處理之控制手段11,及由上 述控制手段1 1之保全功能之啓動狀態之下實施認證’回席 者係具有正當之權限之使用者之認證手段1 3,及由上述認 證手段1 3之認證之完了後’解除由上述控制手段1 1之保全 功能之控制之解除手段1 4之資訊處理裝置1。所以使用者 本身不需要實施煩雜之操作之下’當使用者離開其座席時 ,會啓動由控制手段11之保全功能。且保全功能之啓動之 下,實施認證具有正當權限之使用者之復歸之後,實施該 解除,所以成爲抑制由不正當存取而成爲可以擔保保全之 裝置。 又,將資訊做爲,文字、畫像 '影像或這些之結合而 可顯示於顯示器1 d之畫面之資訊處理裝置1構成爲,具備 有: 用於檢測出有無人之存在之感測手段1 0 (即人感感測 器1 g ),及至少具有實施秘匿(隱藏)顯示於畫面之資訊 之畫面處理之功能之控制手段1 1 ’及當介著人感感測器1 g -25- (22) (22)200416552 感測出,利用該資訊處理裝置之使用者之離席時,啓動由 上述控制手段1 1之畫面處理之控制啓動手段1 2,及由上述 控制手段1 1之畫面處理之啓動之狀態下,用於認證欲利用 該資訊處理裝置者係具有正當之權限之使用者之認證手段 1 3,以及由上述認證手段1 3之認證之完了後,解除由上述 控制手段1 1之畫面處理之控制之解除手段1 4,所以使用者 本身不需要實施煩雜之操作之下,當使用者離席時,由控 制裝置1 1之畫面處理啓動而可以秘匿資訊之內容。並且在 於啓動畫面處理之狀態下,實施具有正當權限之使用者之 復歸之認證之後,才解除畫面處理,使之能再度可能顯示 資訊,由而抑制由他人之不正當之資訊之閱覽,成爲可以 擔保保全之裝置。 同樣,將可以施行各種資訊處理之資訊處理裝置構成 爲:具備有:用於檢測有無人存在之人感感測器1 g,及至 少具有留保爲了實施資訊處理之操作之接受之留保處理之 功能之控制手段1 1,及介著上述人感感測器1 g而感測出利 用該資訊處理裝置之使用者之離席時,啓動由上述控制手 段1 1之留保處理之控制啓動手段1 2,及在於由上述控制手 段1 1之留保處理之在啓動之狀態下,認證欲利用該資訊處 理裝置者係具有正當權限之使用者之認證手段1 3,以及當 由上述認證手段1 3之認證之完了後,解除該由控制手段13 之留保處理之控制解除手段1 4。所以使用者本身不需要實 施煩雜之操作,使用者離席時由控制手段Π 實施接受操 作之留保。並且,認證了具有正當權限之使用者之復歸( -26- (23) 200416552 回座)而解除接受操作之留保,由而抑制由他人 之存取成爲可以擔保保全之裝置。 又,上述之認證手段1 3乃與,記憶有利用該 裝置1者所持有之識別該者之使用者識別資訊之 憶裝置Μ 實施無線通訊,而由上述之規定之記 實施無線通訊,由上述規定之記憶裝置Μ取得使 資訊,而與用於識別具有正當之權限之使用者之 別資訊做比較。 所以使用者本身不需要實施使用者識別資訊 作,對於使用者而言成爲很簡便之裝置。 所以,在於本實施形態之資訊處理裝置1乃 定之人所能涉及之狀況之下之利用上很合宜。特 上隨時可以進而使用之暫租辦公間,或網咖內等 利用。 <第3實施形態> 在於本實施形態中,在於具有資訊顯示功能 理功能之資訊處理裝置1加上配置可以收納種種 可能之收納具2 ’而將兩者之一齊供使用者之利用 按收納具2乃包含得收納物品之所有之雜器 例如桌子之抽屜、貨車、收藏箱、皮包等等均屬 者乃可以將筆記用具、貴重品、文書、書籍等之 於收納具2而可以保管。並且在於收納具2設置上 之不正當 資訊處理 規定之記 憶裝置Μ 用者識別 使用者識 之輸入操 在於不特 別是業務 很合宜的 及資訊處 物品,而 丨。 之槪念。 之。使用 物品收納 鎖裝置2 a -27- (24) (24)200416552 藉由該上鎖裝置2 a來上鎖,當然由而可以抑制收納於 收納具2內之物品之被拿走。並且如第1 2圖上以模式的表 示,收納具2之上鎖裝置2 a與資訊處理裝置1乃可以授受訊 號地,以有線或無線來連接。資訊處理裝置】乃對於收納 具2之上鎖裝置2 a發訊操作訊號’而可以實施其上鎖或解 鎖。 下面以與上述第1實施形態之不同點爲中心做說明。 本實施形態之資訊處理裝置1乃’例如第1 3圖所示, 處理器1 a,主記憶器1 b,補助記憶裝置1 c,顯示器1 d,顯 示控制裝置le,及介著輸入出接口 lh而連接之輸入裝置if ,人感感測器1 g等之硬體資源加上亦內包爲了對於收納具 2之上鎖裝置2a發訊用之訊號接口 lj。 訊號接口 lj之具體的態樣乃做成爲可回應於該資訊處 理裝置1與收納具2之上鎖裝置2 a之間的連接之態樣之方式 〇 詳述之,如果以有線連接資訊處理裝置1與上鎖裝置 2a時,可以採用 RS-232C、USB(Universal Seriai bus) 及其他之有線訊號接口。又以無線連接資訊處理裝置1與 上鎖裝置2a時,可以採用無線LAN ( Local Area Net Work ) '藍芽(商標名)等之資料通訊對講機,或其他之無線 訊號傳送裝置。又與上述第1實施形態同樣,由人感感測 器1 g擔負感測在資訊處理裝置1近傍之規定領域內有無人 存在之感測手段1 0之職責。 通常應由處理器1 a所實施之程式係收納於補助記億裝 -28- (25) (25)200416552 置1 c。執行程式時由補助記憶裝置1 c讀入於主記憶器1 b而 由處理器1 a所解讀。並且,依照程式啓動上述之硬體資源 使之發揮。如第1 1圖所示之控制手段1 1 ’控制啓動手段1 2 ,認證手段1 3,控制之解除手段1 4,以及做爲訊號發訊手 段1 5之功能。 控制手段1 1,控制啓動手段1 2,認證手段1 3 ’控制之 解除手段1 4乃與上述第1實施形態者,同樣的可以構成’ 所以在本例省略其說明。 訊號發訊手段1 5乃,利用訊號接口 lj及其裝置驅動器 之功能,對於收納具2之上鎖裝置2 a發訊操作訊號。訊號 發訊手段1 5乃,介著感測手段1 0感測出,利用該資訊處 理裝置1之使用者之離席時發(訊)出爲了執行上鎖裝置 2a之上鎖之操作訊號。且在於由認證手段13之認證完成之 後發訊出爲了執行上鎖裝置2sa之解鎖用之操作訊號。 換言之,使用者離席時,爲了抑制由他人拿走收納於 收納具2內之物品起見對於收納具2上鎖,然後’具有正當 之限之人再現時,經由上述認證手段1 3認證該使用者之 後解除收納具2之上鎖,由而再度可以將物品放入取出於 收納具2。 但不會妨礙,控制手段1 1,控制啓動手段1 2,認證手 段1 3,及控制之解除手段1 4及訊號發訊手段之各部之功能 分擔爲複數之裝置,由這些之協同動作而成立上述資訊處 理裝置1之情形。 下面參照第1 4圖之流程圖說明本實施形態之資訊處理 -29- (26) (26)200416552 裝置1所實施之處理之程序° 當介著人感感測器1g感測出’利用該資訊處理裝置 1之使用者離席時(步驟s 1 )。啓動由控制手段1 1之畫面 處理(步驟s 2 ),且啓動由控制手段1 1之留保處理(步驟 S3 ) 〇 又,前後於步驟S 2、步驟S 3地對於該上鎖裝置2 a發訊 爲了執行收納具2之上鎖裝置2 a之上鎖之操作訊號(步驟 S2 1 )。由此結果收納具2乃被上鎖。於是在於由控制手段 1 1之畫面處理及留保處理之啓動之狀態下,介著人感感測 器1 g感測出有任何人接近於該資訊處理裝置之情形時( 步驟S 4 ),對於該人發出督促輸入用於識別具有正當權限 之使用者之使用者識別資訊之指示(步驟S 5 ),且接受使 用者識別資訊之輸入(步驟S 6 )。如前述之在於本實施形 態乃,在於上述步驟S 5中’在於顯示器1 d之畫面上顯示該 使用者識別資訊之使用者1 D及7或密碼之輸入對話D °由而 接受使用了輸入裝置If之使用者ID及/或密碼之輸入。由 上述之人完成了使用者識別資訊之輸入之後(步驟S 7 ) ’ 實施比較所輸入之使用者識別資訊及預先收納之具有正當 權限之使用者之使用者識別資訊’而實施使用者之認證。 當如果能夠認證,欲利用該資訊處理裝置者係具有正當之 權限之使用者時(步驟S 8 ),解除由控制手段1 1之畫面處 理(步驟S 9 )。且解除由控制手段1 1之留保處理(步驟 S10)。又前後與步驟S9、步驟S10,對於該上鎖裝置2a發 訊出爲了執行收納具2之上鎖裝置2 a之解鎖之操作訊號( -30- (27) (27)200416552 步驟S 2 2 ),該結果收納具2乃被解鎖。 在於上述步驟S 8中不能認證係具有正當權限之使用者 時,將再度督促輸入使用者識別資訊之輸入。按,雖然在 於第6圖上沒有表示,惟當顯示輸入對話D,而等候輸入 使用者ID、密碼時(步驟S5、步驟S6 ),並沒有被輸入而 經過了定時時間,或在於輸入對話D內所配置之「取消」 按鈕之被按下時,將消去輸入對話D而復原爲啓動螢幕保 護了狀態。即回復於實施上述之步驟S 2,步驟S 3之階段之 處理亦可以。 依本實施形態乃,由於構成了具備有:用於檢測有無 人之存在之感測手段1 0 (人感感測器I g )及, 對於,設置於可能收納種種之物品之收納具2之上鎖 裝置2a得發訊爲了執行上鎖或解鎖用之操作訊號發訊手段 1 5,以及用於認證使用者之離席後回座之人之具有正當權 限之使用者之認證手段1 3而構成。而上述訊號發訊手段1 4 乃由於構成了,當介著上述人感感測器1 g感測出上述使 用者之離席時,發訊出爲了執行上述上鎖裝置2 a之上鎖用 之操作訊號,且在於以上述認證手段1 3之認證完成之後發 訊出爲了執行上述上鎖裝置2a用之操作訊號之資訊處理裝 置1,由而在於使用者之離席之間’可以抑制他人之由收 納具1內不正當的取出或閱覽。所以可能將有被偷竊之虞 之貴重品,或需避免被他人閱覽之機密文書或其他之物品 ,安全的收納保管於收納具2也。 又,具備有,接受由上述資訊處理裝置I之操作訊號 -31 - (28) (28)200416552 而可執行上鎖或解鎖之上鎖裝置2a,而構成可能收納種種 之物品之收納具2,因此可以利用該收納具2而得簡單地保 全各物品。 再者,特別是,在於本實施形態乃,該具備資訊顯示 功能及資訊處理功能之資訊處理裝置1係,具備有,對於 可能收納種種之物品之收納具2之上鎖裝置2 a發訊出執行 該上鎖裝置或解鎖用之操作訊號之訊號發訊手段1 5。而該 訊號發訊手段1 5乃介著上述感測手段1 0感測出,利用該 資訊處理裝置1之使用者之離席時,發訊出爲了執行上述 上鎖裝置2 a之上鎖之操作訊號。且當由上述認證手段1 3之 認證完了後,發訊出爲了執行上述上鎖裝置2a之解鎖之操 作訊號而構成者,所以同時可以達成收納於資訊處理裝置 1之數値之資訊之防護,以及保管於收納具內之文畫等之 資訊之防護。 其他,當然也可以奏出上述第1實施形態上所述之效 果。 本實施形態之資訊處理裝置1及收納具2係在於不特定 之人士會觸及之場所之使用上很合宜。特別是業務員可以 利用之暫時之租借辦公間、或在網咖也很合宜的利用。 <第4實施形態:> 接著,說明之第4實施形態係與上述實施形態2同樣’ 當在於資訊處理裝置1上螢幕保護有啓動之狀態’換言2 上述畫面處理,上述留保處理之在啓動狀態下,做爲認1登 -32- (29) (29)200416552 欲利用該資訊處理裝置1者係具有權限之使用者之方法乃 替代於,由使用者本身之使用者識別資訊之輸入而如第】5 圖以模式的表示地,由使用者預先持有之規定之記憶裝置 Μ而無線接受使用者識別資訊而構成者。 下面以與上述第2實施形態、第3實施形態之不同點爲 中心予以說明。 在於本實施形態乃,做爲規定之記憶裝置Μ而使用 RFID。RFID標誌乃,以無線通訊而非接觸地可能資訊之 讀取及改寫之記錄媒體。RFID之方式係不特別限定。按 爲了防止發生遺留之情形,將規定之記憶裝置Μ做成爲例 如胸章,而或佩帶於身上更合宜。但是規定之記憶裝置Μ 乃不侷限於RFID標誌,採用具有無線通訊功能之可攜帶 資訊處理終端機,特別是以如藍芽(商標名)之具備有資 訊通訊用對講機之攜帶用電話終端機等做爲規定之記憶裝 置Μ也可以。並且在於此種規定之記憶裝置M 記憶用於 識別持有它之使用者之使用者識別資訊。 並且,在於具有資訊顯不功能及資訊處理功能之資訊 處理裝置1加上,配置了可能收納保管種種之物品之收納 具2,而將這些供使用者之利用。並且如第〗5圖所示,收 納具2之上鎖裝置2a與資訊處理裝置丨之可能授受訊號地, 以有線或無線連接。資訊處理裝置1係對於收納具2之上鎖 裝置2 a發訊操作訊號,而執行其上鎖或解鎖者。 本實施形態之資訊處理裝置1乃,例如第1 6圖所示, 處理器1 a,主記億器1 b,補助記憶裝置1 c,顯示器1 d,顯 -33- (30) (30)200416552 不控制裝置le’及介者輸入出接口 lh所連接之輸入裝置】f ,人感感測器1 g,無線通訊裝置Π等硬體資源,加上亦內 包有對於收納具2之上鎖裝置2 a發訊操作訊號之訊號接p 1J。 訊號接口 lj之態樣乃將成爲回應於連接該資訊處埋裝 置1之收納具2之上鎖裝置2 a之間之連接之態樣之方式。 詳述之,如有線連接資訊處理裝置1與上鎖裝置2 a時 ’可以採用R S - 2 3 2 C ’ U S B ’其他有線訊號接口 1 j,無線 連接資訊處理裝置1與上鎖裝置2 a時,可以採用所謂無線 LAN,藍芽(商標)等之資料通訊用對講機,或其他之無 線訊號傳送裝置。(此時上述無線通訊裝置1 i與訊號接□ lj爲同一件係無妨)。 通常由處理器1 a所執行之程式係收納於補助記憶裝置 1 c,在執行(實施)程式時由補助裝置1 c讀取於主記憶器 1 b,而由處理器1 a所解讀。並且,依照該程式啓動上述之 硬體資源發揮如第1 1圖所示之做爲控制手段1 1,控制啓動 手段1 2 ’認證手段1 3,控制之解除手段1 4,以及訊號發訊 手段1 5之功能。由於控制手段1 1,控制啓動手段1 2,認證 手段1 3,控制之解除手段乃可以與上述第2實施形態者同 樣地構成,所以本例中省略其說明。 訊號發訊手段15係利用訊號接口 lj及其裝置驅動器之 功能,對於收納具2之上鎖裝置2a發訊操作訊號。訊號發 訊手段1 5乃當介著感測手段1〇感測出,利用該資訊處理 裝置1之使用者之離席時,發訊出爲了執行上鎖裝置2 a之 -34- (31) (31)200416552 上鎖之操作訊號。且在於由認證手段13之認證完了後發訊 爲了執行上鎖裝置2a之解鎖之操作訊號。換言之,使用者 離席時,爲了抑制由他人拿出收納於收納具2內之物品而 對於收納具2上鎖,然後具有正當之權限之使用者出現時 ,以認證手段1 3認證該使用者之後,解除收納具2之上 鎖,使之再度可以使物品收納•取出於收納具2。 但是不妨礙,控制手段1 1,控制啓動手段1 2,認證手 段1 3 ’及控制之解除手段1 4及訊號發訊手段1 5之各部之功 能之分擔爲複數之裝置,由這些之協同動作而成立爲上述 資訊處理裝置1之情形。 下面參照第1 7圖之流程圖說明本實施形態之資訊處理 裝置1所實施之處理之程序。 當介著感測手段1 〇感測出,利用該資訊處理裝置1 之使用者離席時(步驟S 1 1 )。啓動由控制手段1 1之畫面 處理(步驟S 1 2 ),且啓動由控制手段1 1之留保處理(步 驟 S 1 3 )。 又,前後於步驟S 1 2,步驟S 1 3地對於上鎖裝置2 a發訊 執行收納具2之上鎖裝置2上鎖之操作訊號(步驟S 2 3 )。 由收納具2係被上鎖。於是,由控制手段1 1之畫面處 理及留保處理在於啓動之狀態下,欲利用該資訊處理裝置 1者乃以所持有之規定之記億裝置Μ之間,欲樹立無線通 訊之關係’如果與規定之記憶裝置Μ之間建立無線通訊時 (步驟S 1 4 )。即取得記憶於規定之記憶裝置Μ之使用者 識別資訊(步驟S 1 5 ),於是比較所取得之使用者識別資 -35- (32) (32)200416552 訊與預先收納之有關於具有正當權限之使用者識別資訊來 實施使用者認證,如果能夠認證欲利用該資訊處理裝置1 之人係具有正當之權限之使用者時(步驟S 1 6 ),解除由 控制手段1 1之畫面處理(步驟S 1 7 ),並且解除由控制手 段Π之留保處理(步驟S 1 8 )。又與步驟S 1 7,步驟s 1 8地 對於該上鎖裝置2 a發訊爲了執行收納具2之上鎖裝置2 a之 解鎖之操作訊號(步驟S 2 2 )。結果收納具2乃被解鎖。在 於上述步驟S 1 6中不能認證具有正當之權限之使用者時’ 不實施畫面處理,控制處理之解賒,復原於啓動螢幕保護 之狀態。即回至上述之步驟S 1 2、步驟S 1 3之階段。 依本實施形態時,由於具備有,用於檢測有無人存在 之感測手段1 〇之人感感測器1 g,及對於設置於可能收納種 種之物品之收納具2之上鎖裝置2 a得發訊爲執行其上鎖或 解鎖之操作訊號之訊號發訊手段1 5,以及用於認證使用者 之離席後回來之人之具有正當權限之使用者之認證手段13 而構成,而上述訊號發訊手段15係介著人感感測器lg而感 測出上述使用者之離席時發訊爲執行上述上鎖裝置2a之上 鎖之操作訊號,且由上述認證手段1 3之認證完了後,爲了 實施上述上鎖裝置2a之解鎖時之操作訊號之資訊處理裝置 1 ° 所以可以抑制使用者之離席之間,他人之不正當地由 收納具2內拿出或閱覽之情形,所以可以將有被偷竊之虞 之貴重品或要避免由他人閱覽之機密文書或物品安全的收 納保管於收納具2也。 -36· (33) (33)200416552 又,具備接受來自上述資訊處理裝置1之操作訊號而 上鎖或被解鎖之上鎖裝置2a而可以構成收容種種之物品之 收納具2所以利用該收納具2而簡便的可以保全各種物品。 再者,特別是本實施形態乃,由於具備了資訊顯示功 能及資訊處理功能之資訊處理裝置1乃,也具備有對於設 置於可收納種種之物品之收納具2之上鎖裝置2 a可以發訊 爲了實施其上鎖或解鎖用之操作訊號之訊號發訊手段1 5, 而此訊號發訊手段1 5之介著上述感測手段1 0而感測出,利 用該資訊處理裝置1之使用者之離席時發訊爲了執行上述 上鎖裝置2a之操作訊號,且在於由上述認證手段13之認證 之完了之後發訊爲執行上述上鎖裝置2a之解鎖之操作訊號 而構成者,所以同時可以達成收納於資訊處理裝置1之數 位資訊之防護,以及保管於收納具內之文書等之資訊之防 護者。 其他當然也可以達成上述第2實施形態所述之效果。 又,本實施形態之資訊處理裝置1及收納具2係成爲在 於不特定之人之手之可以涉及之地點之利用上很適宜。特 別是業務員之可以進駐之暫時(公共)辦公間、網咖等也 可以合宜的利用。 <第5實施形態> 本實施形態之資訊處理裝置3乃以維持使用者所利用 之工作空間之總體的保全爲念頭的構成者。 下面以與上述第1實施形態乃至第4實施形態之不同點 -37- (34) (34)200416552 爲中心加以說明。 本實施形態之資訊處理裝置3乃如第2 3圖所示,以一 個控制裝置4及至少一個收納具監護裝置5爲主要之要素之 系統。 控制裝置4乃,設置於配置有例如桌子、椅子等雜器 ’或具備資訊顯示功能及資訊處理功能之電腦6等之工作 空間者。 收納具監護裝置5乃由使用者之意願任意的設置於桌 子之抽屜、櫃子、貨車、收藏箱,使用者之皮包等之收納 具2者,收納具監護裝置5乃對於收納具2裝卸自如爲宜。 收納具監護裝置5乃,例如第24圖所示,具備有用於 感測出任何人操作收納具2之感測部5 1,及上述感測部5 1 之感測出任何人所操作時用於發報(發訊)之發報部5 2, 及接受解除上述發報部5 2之發報功能用之操作訊號之操作 訊號接受部5 3。 由於本實施形態之收納具監護裝置5係配置於收納具2 內地予以使用,所以在於感測部5 1上’安裝檢測由收納具 2外入射之光波之光感測器5 a。換言之’感測部5 1乃,由 感測出任何人打開收納具2時之入射於收納具2之光波’由 而感測出收納具2之被打開。但是安裝於感測部5 1之感測 器元件係不限於光感測器5 a。所以例如’用於檢測出由任 何人之操作所發生之振動之振動感測器。用於檢測傾斜之 傾斜感測器,或配合於閉合收納具2之收納空間之抽屜或 門之感壓感測器(當抽屜、或門或被開閉時’檢測出抽屜 -38- (35) 200416552 或門所受之壓力之變化)。距離感測器(用於檢測收納 2之開啓狀態與閉合狀態之變化之距離。例如朝向上方 安裝於抽屜內,抽屜被拉出時,從感測器到天板之間沒 物體存在),其他都可能採用。 發報部5 2乃發訊出有任何人對於收納具2施加操作 通報之訊號,或發訊出威嚇操作收納具2之人之警報。 本實施形態之發報部5 2乃實裝有爲發報用之裝置, 如發光而發報之發光裝置5b及/或輸出聲音而發報之聲 輸出裝置5 c,以及控制上述裝置5 b、5 c之控制電路5 d而 成。 這些通常以電池來驅動,惟執行發報係感測部5 1之 測出有於收納具2 操作時,更具體的說,感測部5 1之 感測器5 a之檢測出,由收納具2外有入射之光波之時點 又構成爲,感測部5 1 —旦感測出有對於收納具2之操作 ,繼續的一直發報,或只在於感測部5 2之光感測器5 a 測出光波之間做發報也可以。或自發報開始一定時間做 報也無妨。按感測部5 1採用太陽電池時,可以利用收納 2被打開時入射之光波爲能量來執行發報也。 操作訊號接受部(受訊部)5係藉有線或無線接受 作訊號。 操作訊號係由控制裝置4所送來。在於本實施形態 ,該具有接受由控制裝置4所無線發訊之操作訊號之功 之無線對講機5e來擔任操作訊號接受部53之職務。無線 講機5 e係與發報部5 2之控制電路5 d連接。並且發報部 具 地 有 之 例 構 感 光 〇 時 檢 發 具 操 乃 能 對 5 2 -39- (36) (36)200416552 之控制電路5 d乃,介著操作訊號接受部5 3接受了欲解除保 全功能之意旨之操作訊號時不執行發報動作。而只在於沒 有接受解除保全功能之意旨之操作訊號時,介著上述感測 部5 1感測出有人對於收納具2有操作時會執行發報動作 地被構成。換言之,由控制裝置4而被發訊,爲了解除用 之操作訊號,而以操作訊號接受部5 3正在接受之間,雖然 感測部5 1檢測出有人對於收納具2有操作之情形之下, 由發報部5 2之發報係不會執行。但是不妨礙操作訊號接受 部5 3係,有線通訊接口。收納具監護裝置5與控制裝置4係 有線連接之態樣。 第3 0圖表示,在於收納具監護裝置5中,對於負載Z, 換言之控制電路5d,發光裝置5b,聲音輸出裝置5c,無線 對講機5 e等供給電源B之電路之原理的電路圖。在於電路 上有半導體開關(例如配置有電場效應電晶體、雙極電晶 體、閘流管等)5h。而介由該半導體開關5h之ON/OFF而 可以控制對於負載Z之電力供給。圖示例係,以η通道 MOSFET 5h做爲開關。未受光之光感測器5a係做爲很大的 電阻而作用。當光感測器5a之沒有受光時,半導體開關之 MOSFET 5h之漏極一源極間即成爲隔斷狀態,施加於負載 Z之電壓即成爲零。並且光感測器5 a受光時,由光感測器 5a而有電流流過MOSFET 5h之閘極一源極間電壓增大,而 漏極一源極間成爲導通狀態。該結果對於負載Z施加電壓 。如上所述,本實施形態之收納具監護裝置5乃做爲當光 感測器5之檢測出光波時對於發報部52及操作訊號接受部 -40- (37) (37)200416552 5 3供給電力之構成而達成省電力化及延長電池之壽命。 綜而言之,具有感測部5 1,發報部5 2及操作訊號接受 部5 3之收納具監護裝置5乃做爲第1 8圖所示之控制手段!】 而執行對於抑制具有正當之權限之使用者以外者之對於收 納具2之操作之保全功能(即不正當操作檢測及發報功能 )c 另一方面,控制裝置4係例如第2 5圖所示,用於檢測 出使用者,其他人之有無存在之人感感測器4a,爲實施與 收納具監護裝置5之無線通訊之無線對講機4 b,對於使用 者等,顯示任何標示之顯示裝置4c (如LED之發光裝置或 顯示器),接受由使用者之操作輸入之輸入裝置4d (典型 的有鍵盤輸入裝置),與電腦6用有線或無線連接用之通 訊接口 4e等之硬體資源係由控制電路4f所控制者。惟實裝 有解讀收納於記憶體4g之程式,而使上述之硬體資源動作 之處理器(不圖示)者也可以。通常,控制器裝置4係接 受外部之電力之供給而動作。惟通訊接口爲USB、IEEE 1 3 9 4等時,介著通訊接口 4 e由電腦接受電力供給亦可能。 又以電燈線(或電力線)通訊而將控制器裝置4與電 腦6通訊可能地連接亦可能。詳述之,控制裝置4及電腦6 係做爲通訊接口 4e、6g而具備有電力線MODEM,如介著 電力線MODEM連接於電燈線時,即一面由電燈線接受電 力供給,介著同一電燈線而控制裝置4與電腦6係互相可能 。於是,該控制裝置4係由控制電路4f而利用上述之硬體 資源發揮第1 8圖所示之感測手段1 0,認證手段1 3,控制解 -41 - (38) (38)200416552 除手段〗4之功能。 感測手段4乃,檢測該設置了控制裝置4之工作空間內 有沒有人存在。介著感測手段1 〇可能感測使用者之在席或 離席。在本實施形態乃,將與上述第1實施形態同樣之人 感感測器4a使用爲感測手段1 0。又如於第1實施形態所 又如,於上述第1實施形態所補充說明,在於人感感 測器4a組配距離感測器等而使用也無妨。再者,如控制裝 置4與電腦6係通訊可能地被連接時,對於電腦6逐一將有 關感測手段1 〇之輸出之資訊發訊而構成亦可以。 認證手段1 3係,認證使用者之離席後回席之人是否具 有正當之權限之使用者之情形。詳述之,以人感感測器4a 用爲感測手段1 0時,由於人感感測器4a本身不會判別出現 於工作空間之人物係使用者或使用者以外之人物,所以藉 由認證手段1 3執行使用者之認證。使用者之認證係例如對 於復歸於工作空間之人,要求輸入用於識別具有正當使用 者之使用者識別資訊之態樣地被實施。 關於具有正當之權限之使用者之使用者識別資訊係, 預先以平常文或密碼之方式地記憶於。控制裝置4或實裝 於該控制電路4f之記憶體4g等之記憶裝置,或與控制裝置 4通訊可能地連接之電腦6之主記憶器6b或補助記憶裝置6c 之預定之記錄領域。而在於執行認證時,與介著輸入裝置 4d所輸入之使用者識別資訊做比較。本實施形態係採用, 做爲使用者識別資訊而介著輸入裝置4d輸入“密碼”之方式 -42 - (39) (39)200416552 但是使用者識別資訊乃不侷限於密碼。所以亦可使用 依據使用者之身體特徵,而將生物形態資訊做爲使用者識 別資訊來認證也可以。此時預先在於控制裝置4設置用於 輸入生物形態資訊所使用之裝置。又認證手段1 3係倂用複 數之方式來實施認證之方式也可以。 又,認證手段1 3乃,以介著上述人感感測器4a而感測 有人之接近對於該人發出督促輸入該用於識別使用者之使 用者識別資訊之指示,同時可能接受該輸入者爲宜。 督促使用者識別資訊之指示乃以,畫面顯示、聲音輸 出或介著其他種種之使用接口之態樣來發出。在於本實施 形態乃,介著顯示裝置4c,而對於該人之視覺訴求之態樣 地督促輸入使用者識別資訊之輸入之符號(訊號)(例如 LED之發光、明滅等),同時接受該輸入之方式者。又如 控制裝置4係實裝有不圖示之聲音帶出裝置而輸出督促輸 入使用者識別資訊之輸入之聲音也可能。 控制解除手段1 4係,以上述感測手段1 0之檢測出,使 用者之離席爲條件將以認證手段1 3之認證完了之後,解除 該由上述控制手段1 1所開始實施之規定之保全功能。如前 面所述,在於本實施形態中,設於收納具2之收納具監護 裝置5將成爲執行該收納具2之開閉之保全功能之控制手段 11° 所以欲解除由收納具監護裝置5所開始執行之保全功 能時,須要將表示欲解除之意旨之操作訊號輸入於收納具 -43- (40) (40)200416552 監護裝置5。控制之解除手段1 4乃利用無線對講機4b之功 能。而在於由認證手段1 3之使用者認證處理之成功時’朝 向收納具監護裝置5發訊出預解除保全功能之操作訊號。 下面參照第2 6圖,第2 7圖之流程圖說明本系之控制裝 置4及收納具監護裝置5所執行之基本的處理程序(順序) c 如第2 6圖所示,當介著人感感測器4 a,介著人感感測 器4a感測出使用者在席時,控制裝置4係向收納具監護裝 置5繼續的發訊做爲了解除保全功能之操作訊號(步驟S2 5 )° 並且,介著人感感測器4a感測出使用者離席時(步 驟S26 )停止爲了解除保全功能用之操作訊號之發訊(步 驟S 2 7 )。由而啓動收納具監護裝置5之保全功能。控制裝 置乃,在於使用者離席之後,換言之在於由收納具監護裝 置5之保全功能之啓動狀態中,介著人感感測器4a感測出 有人接近於該資訊處理裝置3時(步驟S28 ),對於該人發 出督促輸入該用於識別具有正當權限之使用者之使用者識 別資訊之指示(步驟S 2 9 ),並且接受使用者識別資訊之 輸入(步驟S 3 0 )。 如前述,在於本實施形態乃,在於上述步驟S 3 0乃介 著顯示4 c輸出訴求於該人之視覺之態樣之符號(訊號)而 督促輸入使用者識別資訊’同時接受使用輸入裝置4 d之密 碼。 當由上述該人之使用者識別資訊之輸入完成後(步驟 •44- (41 ) (41 )200416552 S 3 1 )。比較被輸入之使用者識別資訊與預先收納於控制 裝置4 (或電腦6 )之有關於具有正當之權限之使用者之使 用者識別資訊,由而實施使用者認證。如果能夠認證出’ 出現於工作空間之人係具有正當權限之使用者時〔步驟 S32 ),即解除由收納具監護裝置5之保全功能。換言之開 始發訊爲了解除保全功能之操作訊號(步驟S 3 3 )。在於 上述步驟S 3 2無法認證(確認)係具有正當權限之使用者 時即再度督促輸入使用者識別資訊。 雖然收納具監護裝置5係用於執行有關於收納具2之開 閉之保全功能者,惟該執行係限定於’沒有接受來自控制 裝置4之須解除保全功能之意旨之操作訊號之期間。如第 2 7圖所示,收納具監護裝置5之感測部5 1之感測到對於收 納具2之操作,並且操作訊號接受部5 3之未能接受(受訊 )來自控制裝置4之操作訊號時(步驟S 3 4、步驟S 3 5 ) ’ 發報部5 2將發報(步驟S 3 6 )。另一方面,雖然感測部5 1 感測出對於收納具2之操作(註:有人打開收納具等)’ 但是操作訊號接受部5 3仍然可以接受操作訊號時,即不實 施發報動作。 換言之收納具監護裝置5係,以設置於控制裝置4之感 測手段1 〇之人感感測器4 a之檢測出,使用者之已離席爲條 件,開始執行關於收納具2之開閉之保全功能,同時由設 置於控制裝置4之控制之解除手段1 4來解除該執行。 接著說明有關於可以通訊地連接於控制裝置4之電腦6 •45- (42) (42)200416552 本電腦6係如已存之個人電腦、工作站、Pda等,可 以以將資訊’以文字、畫像、影像、或這些之結合地顯示 於畫面’並且可以實施(執行)種種之資訊處理者之方式 地被構築。電腦6係在於本系統中雖然不是必須之要素, 惟與控制裝置4連攜而可能執行後述之處理。 電腦6乃,例如如第2 8圖所示,由處理器6a,主記憶 器6b ’補助記憶裝置6c,顯示器6d,顯示控制裝置6e,輸 入裝置6f等之硬體資源,加上亦內包,以有線或無線而連 接控制裝置4之通訊接口 6 g。 通訊接口 6g之具體的態樣乃將成爲回應於控制裝置4 與該電腦6之間之連接之態樣者。詳述之,以有線來連接 控制裝置4與電腦6時,即可以採用R S - 2 3 2 C、U S B、IE E E 1394及其他之有線訊號接口。 控制裝置4與電腦6之以無線連接之情形時,可以採用 所謂無線LAN、藍芽(商標)等之資料通訊用對講機,或 其他之無線訊號傳送裝置。 通常,由處理器6a所執行(實施)之程式係收納於補 助記憶裝置6c,在於欲實施程式時,由補助記憶裝置6c而 讀取於主記憶器6b。而以處理器6a來解讀,並且以該程式 啓動上述之硬體資源,而使之可以發揮如第1 0圖所示之控 制手段1 1,控制啓動手段1 2,控制之解除手段1 4之功能。 控制手段1 1係具有,爲了實施秘匿(隱藏)顯示於畫 面之資訊用之畫面處理之功能,及爲了留保使之實施資訊 處理之操作之接受之留保處理之功能。控制手段1 1係例如 -46- (43) 200416552 使用習知之螢幕保護模組程式而可以構成 保護模組程式而可以秘匿(隱藏)現在正 留保操作之接受。按由控制手段Π之畫面 乃,將顯示器6d之電源OFF,換言之將顯 ,亦是一策。 控制啓動手段1 2係,當以控制裝置< 用該電腦6之使用者之離席時,啓動藉由 全功能換言之畫面處理及留保處理者。在 控制裝置4 (之控制電路4f或處理器)乃 測器4a而檢測出使用者之離席時,介著通 示該意思之資訊傳達於電腦6。 而當介著通訊接口 6g接受該資訊時, 乃啓動由控制手段1 1之控制。控制啓動手 主體地構成。 控制之解除手段14乃,當具有正當之 復歸於工作空間時,解除藉由控制手段1 1 保處理。本實施形態之控制裝置4 (之控 器)係當藉由認證手段1 3認證該使用者 席之人係具有正當權限之使用者之後,介 該旨意之資訊傳達於電腦6。介著通訊接 時,控制之解除手段乃解除依據螢幕保護 功能,於是回復顯示資訊之畫面,再開始 之解除手段14也是以程式爲主體而構成。 但是在於該電腦6設置實施使用者認 。藉由啓動螢幕 顯示之畫面,且 處理之態樣之一 示器6 d予以消燈 1感測出現在利 控制手段Π之保 於本實施形態之 ,當介著人感感 訊接口 4c而將表 控制啓動手段1 2 段12乃以程式爲 權限之使用者之 之畫面處理,留 制電路4f或處理 之離席之後,回 著通訊接口 4e將 口 6g接受該資訊 程式之螢幕保護 接受操作。控制 證之認證手段1 3 -47- (44) (44)200416552 也不妨。此時之認證手段1 3係,用於當由上述控制手段1 1 之畫面處理及操作之接受之留保啓動之狀態下,復歸於工 作空間之人係具有正當之權限之使用者之情形。而此認證 乃,以例如對於出現於工作空間之人,要求它輸入,用於 識別具有正當之權限之使用者之使用者識別資訊之態樣地 予以實施。有關具有正當之權限之使用者之使用者識別資 訊係預先(以平文或加密)地收納於,主記憶器6b或補助 記憶裝置6c之規定之記憶領域,或與該電腦6可以通訊地 連接之規定之資訊處理終端機(不圖示)之主記憶器或補 助記憶裝置之規定之記憶領域。在執行認證時,乃與介著 輸入裝置6f所輸入之使用者識別資訊做比較。 再者,如採取有關於實裝於控制裝置4之感測手段1 0 之輸出之資訊係發自控制裝置4之構成之情形時,在啓動 有,由上述控制手段1 1之畫面處理及留保處理之狀態下, 介著上述感測手段1 〇而感測出有任何人接近時,對於該人 可以發出督促使用者識別資訊之輸入之指示。 督促輸入使用者識別資訊之輸入之指示乃,以畫面顯 示、聲音輸出,介著其他之使用者接口之態樣地可以發出 。例如一面在於顯示器6d上,顯示要求使用者識別資訊之 輸入之對話,同時可以接受其輸入。 在控制裝置4及電腦6分別設有認證手段1 3,而各自可 實施使用者認證時,有關於收納具2之保全功能之解除係 使用控制裝置4側之認證手段1 3。有關於電腦6之保全功能 (畫面處理、留保處理)之解除係可以使電腦6側之認證 -48- (45) (45)200416552 手段1 3而實施。或使用任何一方側之認證手段丨3而實施認 證時,可以解除兩方之保全功能之方式亦可以。 控制裝置4及電腦6乃’可以介著通訊接口 4e、6g,互 相地通融關於使用者認證之成功或否之資訊。 又,在於電腦6側設有認證手段1 3時,在於控制裝置4 側即不一定需要設置認證手段1 3 (又在於控制手段4不必 要設置輸入裝置4d)。此時爲了解除由收納具監護裝置5 之保全功能,須使用電腦6來執行使用者認證也。當在於 電腦6側之認證手段1 3而使用者認證成功時,對於控制裝 置4側發訊表示該旨意之資訊,接受該資訊之控制裝置( 之控制電路4f或處理器)即對於收納具監護裝置5而發訊 爲了解除之用之操作訊號。換言之,由控制裝置4與電腦6 之協同動作,而成立爲申請專利範圍第1項所述之「資訊 處理裝置」或申請專利範圍第1 1項所述之「控制裝置」。 以第2 3圖、第3 1圖及第3 2圖表示本實施形態之收納具 監護裝置及控制裝置4之利用形態。 第2 3圖係組配了,收納具監護裝置5,控制裝置4及電 腦6地使用之基本形態。如不經過認證正當之具有正當權 限之使用者之手續地操作收納具2即會發報(發出警報或 警訊)以及使具有正當之權限之使用者之對於電腦6之存 取不可能達成。換言之同時保護,收納具2之保全及對於 電腦6之保全。 第3 1圖係除了收納具監護裝置5之形態,此形態係只 保護電腦6之保全。如果在於收納具2沒有保管貴重品或秘 -49· (46) (46)200416552 密文件等時或收納具2本身之不存在之形態下,利用第3】 圖之形態就可以。 第3 2圖係只使用收納具監護裝置5之形態。在此方式 時不關是否具有正當權限之使用者,只要操作了收納具2 就會一定發報,如此只使用收納具監護裝置5也可以簡易 地保護收納具2之保全。 下面對於收納具監護裝置5做補充說明。 有時候在於規定之工作空間內有複數個之收納具監護 裝置5存在。這些複數個之收納具監護裝置5之由某一特定 之使用者或使用者群所使用時,各個之收納具監護裝置5 與控制裝置4之間之無線傳送路乃不一定要區別。特別是 —齊地解除全部之收納具監護裝置5之保全功能也沒有關 係時,即自控制裝置4對於各收納具監護裝置5所發訊之操 作訊號就可以共同化。惟只要解除一部份之收納具監護裝 置5之保全之要求時,就需要使各收納具監護裝置5與控制 裝置4之間之通訊上分派別(各自)之頻道之必要。在於 規定之工作空間內有複數之控制裝置4之存在。而對各控 制裝置4所對應地有收納具監護裝置5之存在時也同樣。 收納具監護裝置5及控制裝置4所實裝之無線對講機所 使用之多重化方式雖不做特限定,惟在於各收納具監護裝 置5與控制裝置4之間之無線傳送路上(爲了分派各自之頻 道起見)須要附與識別子。上述之識別子係分別記憶於控 制裝置4及收納具監護裝置5。例如操作實裝於收納具監護 裝置5之D I P (雙列直插)開關,而決定應附與此收納具監 •50- (47) (47)200416552 護裝置5之識別子(特別是數位數之號碼),且介著輸入 裝置4 d而將同一識別子輸入於控制裝置4而記憶於實裝於 控制裝置4之記憶器4g。 下面舉具體例加以說明。本例之收納具監護裝置5乃 ’如第3 3圖所示,以蓋9被覆,該實裝了光感測器5 a,控 制電路5 d,發光裝置5 b,聲音輸出裝置5 c,無線對講機5 e 等之硬體資源之電路基板5i而構成者。DIP開關7也安裝 於電路基板5 i上。光感測器5 a,發光裝置5 b係至少將其〜 部份露出於外部。D I P開關7係結線於控制電路5 d,或無線 對講機5e,而由DIP開關7所設定之參數係參照於這些電路 5 d或無線對講機5 e。例如由控制裝置4所發訊之無線對講 機5 e所接受之操作訊號上含有用於識別無線傳送路之識別 子(這是用於識別,操作訊號之收訊址之用於識別收納具 監護裝置5之識別子)時,控制電路5 d或無線對講機5 e係 比較含於操作訊號之識別子與由D I P開關7所設定之參數, 而判斷受理該操作訊號或無視該操作訊號。換言之,以 D I P開關7來設定爲了使控制裝置4與收納具監護裝置5予以 對應之識別子也。 在於收納具監護裝置5之盍5上,形成有可以插通設定 鍵8之開口 9 1。 口又疋鍵8係使用於將某規疋之識別子賦予一或複數之 收納具監護裝置5。詳述之’爲了將規定之參數設定於安 裝於收納具監護裝置5之DIP開關7而使用者。將由開口 91 插入設定鍵8 ’而將該先端部卡合於D p開關7之操作部7 j -51 - (48) (48)200416552 ,由而可以將由該設定鍵8所規定之參數設定於DIP開關7 〇 詳述之圖示例之DIP開關7 (雙列直插開關7 )乃具備 有滑動移動之複數之操作部7 1之滑動D 1 P開關7 (滑動雙列 直插開關7 )。 如第33圖、第34圖所示,滑動DIP開關7係以臨接於形 成於蓋9之開口 9 1狀地被設置。該各操作部7 1係略沿著該 由開口 9 1所插入之設定鍵8之插入方向而可變位之朝向地 被配置。被配列之各操作部7 1係可定位於近於開口 9 1側或 遠於開口 9 1側之二位置其中之一個位置。 各個之操作部71係可以設定HI/LO之二値之其中之一 ,以DIP開關7全體而言,可以設定相等於操作部71之數目 之位元數之參數。又所有之操作部7 1乃,在於初期狀態( 例如出貨時)預先被定位於近於開口 9 1側。並且與由開口 9 1所插入之設定鍵8卡合後變位至遠離開口 9 1之方向。 設定鍵8係,例如樹脂製之薄板狀體。在其前端部成 形有卡合緣8 1及迴壁溝8 2。卡合緣8 1係當由開口 9 1插入設 定鍵8時與操作部7 1卡合,使之變位至規定之位置者。設 置於在於DIP開關7所具有之複數之操作部71之中之成爲應 操作之對象之操作部7 1之部位。 迴避溝82係當插入設置鍵8時,迴避操作部71之干涉 ,而使操作部7 1不會變位者。設置於對應於在於複數之操 作部7 1中之不成爲操作之對象之操作部7 1之部位。迴避溝 82之深度方向(與設定鍵8之插入方向成平行之方向)之 -52- (49) (49)200416552 尺寸係,相等於開關之操作部7 1之行之大小或大於它。圖 示例係例示不貫穿設定鍵8之表面·背面之有底溝。惟貫 穿設定鍵8之表·背面之構造也可以。 開始使用收納具監護裝置5時’欲於D I P開關設定參數 之使用者乃’握持設定鍵8之基端部’而將它由開口 9 1插 入於蓋9內。於是設於前端部之卡合緣8 1乃碰接於一或複 數之操作部7 1。於是再推入於深奧部’由而與卡合緣8 1卡 合之操作部71係受了操作力而變位於離開開口 91之方向。 另一方面,進入於迴避溝82內之操作部71即依然地不會改 變其位置。此狀態表示於第3 5圖乃至第3 7圖。然後從開口 9 1拔出設定鍵8,而完成參數之設定作業。 如果對於複數之收納具監護裝置5欲設定同一之參數 時,當然對於這些收納具監護裝置5之每一個地實施上述 之作業就可以。 按,圖示例係,在形成於蓋9之開口 91之周緣與DIP開 關7之間設置有導引構件92。在於導引構件92上,由其表 面突出有一對凸條93。成對之凸條93之離開距離係略相等 於設定鍵8之寬方向(對於插入方向成垂直之方向)之尺 寸。於是使設定鍵8之兩側對於各凸條93滑動(再加上, 設定鍵8之表面對於導引構件92之表面滑動),由而將設 定鍵8之前端部朝向DIP開關7之操作部71可以適宜地進入 者。 再者’爲了防止由開口 91所插入之設定鍵8過度的進 入’發生連進入於迴避溝82內之操作部71也被操作之情形 -53- (50) (50)200416552 起見,設置在於某一位置而抑止設定鍵8之該處以上之進 入之擋止部94也合宜。 對於已設定了參數之DIP開關7欲再設定別的參數,或 欲將D I P開關7回復爲初期狀態,或遺失了設定鍵8時等等 可以開啓蓋9或卸下蓋9,而直接的操作該操作部7 1就行。 再者,在於控制裝置4上,設置與設置於收納具監護 裝置5同樣之DIP開關(不圖示),開口(不圖示)也可以 。採此方式時,就可以將對於收納具監護裝置5所適用之 設定鍵8也適用於控制裝置,由而對於兩者設定同一之參 數,換言之,可以設置可對應於兩者之識別子。 如上所述由於構成爲一種開關設定機構,具備有:備 有複數之操作部7 1,而各操作部7 1係個別地操作之機械的 開關7,及由外部遮蔽該開關7之蓋9 ’及形成於上述蓋9之 開口91,及由上述開口 91插入而得將前端部卡合於上述開 關7之操作部7 1之設定鍵8而構成之開關設定機構中’其特 徵爲,在於對應於上述設定鍵8之前端部之欲操作之操作 部7 1之部位地,設置與上述操作部7 1卡合’而可以使變位 至規定之位置之卡合緣8 1 ’且在於對應於不應操作之操作 部7 1之部位地,設置爲了避免該操作部7 1之干涉用之迴避 溝83,而藉由使用者之由開口 91插入設定鍵8而可以一插 地設定複數之操作部71 (之位置)者。 所以簡便地可以實施對於開關7之設定參數設定作業 。與逐一操作開關7之各操作部7〗比較時可以減輕負擔。 這件事表示特別是對於複數之設定對象機器(收納具 -54- (51) (51)200416552 監護裝置5及/或控制裝置4 )分別設定同一之識別子之情 形等,將複數個之DIP開關7設定同一狀態之作業上發揮其 效果。換言之可以使用同一設定鍵8而迅速地將複數之開 關7設定爲同一狀態也。加上,以蓋9來防護開關7 ’所以 開關7之操作部7 1之被誤操作之情形得於避免也。 再者,第33圖乃至第37圖所示之例係,具有複數之操 作部7 1之一個D I P開關7係相當於本案所指之「機械的開關 j ° 但是組配(分別至少具有一個操作部)之複數之開關 裝置而構成本案之「機械的開關」亦無妨° 又開關不侷限於操作部7 1之滑動移位之滑動開關’所 以例如操作部擺動之槓桿開關或搬扭開關或操作部之會突 沒之按壓開關等亦可能採用。 再者,圖示例之D I P開關7係各操作部7 1係被定位於罪 近於開口 9 1側,離開開口 9 1側之二位置之其中之一位置’ 所以由設定鍵8之卡合緣8 1所推壓而變位之操作部7 1乃一 定滑移到離開開口 9 1之側之位置,所以該設定於設定鍵8 且對應於應操作之各個操作部7 1之卡合緣8 1係會成一列地 排齊於設定鍵8之寬度方向。惟,得將操作部7 1設定爲三 個位置以上之開關(換言之,由各操作部7 1所設定値之範 圍爲三以上)也可以採用。此時即如第3 8圖所示’該設置 於設定鍵8之卡合緣8 1係回應於所對應於各操作部7 1之設 定位置(由各操作部7 1所設定之參數)’而沿著設定鍵8 之插入方向地互相偏位於不同之部位也可能也。 -55- (52) (52)200416552 由而可以做到各收納具監護裝置5與控制裝置4之間之 傳送路之多重化。特別是在於別個之使用者所使用之複數 之控制裝置4及對應於該控制裝置4之收納具監護裝置之間 之操作訊號之授受係不會干擾(混訊)地可以適當地執行 〇 詳細之,在於一工作空間內混在有複數之使用者所使 用收納具監護裝置5之狀況下,某一使用者介著本身所使 用之控制裝置4而實施使用者認證時,只對於該使用者所 利用之收納具監護裝置傳送操作訊號。而解除其保全功能 。而其他之使用者所利用之收納具監護裝置5係仍然繼續 保持其保全功能。如上所述,在於複數之使用者所共用之 工作空間內,可以各使用者地擔保其保全功能。又對於控 制裝置4上可以將賦予各收納具監護裝置5之識別子與使用 者識別資訊做有關連地予以記憶。由而控制裝置4乃在於 經過認證手段1 3之使用者認證之後,選擇地解除該經認證 之使用者之收納具監護裝置5之保全。 收納具監護裝置5乃將其外觀仿效於其他物品之形態 地予以成形,或附帶其他之物品之功能地形成爲宜。特別 是以收納於收納具2也不會感到不自然之物品之形態,例 如仿效文具或與收納具2 —齊使用之物品之形態地形成, 或將這些物品上附帶地設置控制手段1 1之功能爲宜。 例示之,即仿效爲收納文件之檔案夾、箱、筆記用具 、其他文具、隔開收納具2之收納空間之分隔板等之外觀 的成形,或在這些之物品上實裝成爲感測部5 1,發報部5 2 -56- (53) (53)200416552 ,操作訊號接受部5 3之要素之各裝置而構成收納具監護裝 置5。由而可以奏出,例如實施不正當行爲之使用者之不 容易發現具備於收納具2內之收納具監護裝置5之僞裝之效 果,或平時使用者之可以將收納具監護裝置5用做檔案夾 、箱子、及其他物品等,實用面上之效果。 第3 3圖所示之例係,例如以樹脂製之蓋9而將收納具 監護裝置5之外形仿效於檔案夾來成形之例子。 擔負控制裝置1 1之收納具監護裝置5所執行之保全功 能乃只在於接受來自控制裝置4之解除用之操作訊號之接 受期間被解除,換言之,使用者之在席之間,控制裝置4 乃可以繼續的發訊爲了解除之操作訊號。惟別的態樣乃可 以構成爲:當控制裝置4係感測出,使用者離席時,發訊 該爲了啓動收納具監護裝置5之保全功能用之操作訊號, 且當得認證出具有不當之權限之使用者之復席時發訊出用 於解除收納具監護裝置5之保全功能用之操作訊號也可以 〇 此時之收納具監護裝置5乃,接受爲了啓動用之操作 訊號時開始執行保全可能。在於執行保全功能之狀態之下 ,接受爲了解除之操作訊號時,停止保全之功能。關於現 在在於執行保全功能之狀態(使用者離席之狀態)’或應 停止保全功能之狀態(使用者在席之狀態)之資訊係被保 持於收納具監護裝置5 (安裝於它之不圖示之記憶器)。 換言之在於操作訊號接受部5 3接受其中之一之操作訊號時 ,回應於該操作訊號之內容切換所保持之狀態。 -57- (54) 200416552 發報部5 2之控制電路乃由感測部5 I 具2之操作,又且參照上述記憶器,而現 行保全功能之狀態時,執行發報動作。 將發報部不設於收納具監護裝置5側 裝置4側也可能。設置於控制裝置4之發報 手段1 〇檢測出使用者之離席到以認證手 正當之權限之使用者之復席爲止被置於可 且收納具監護裝置5係介著感測部5 1感 納具2之操作時,利用無線對講機5 e之功 該旨意之資訊。控制裝置4之發報部係, 監護裝置5所發訊之資訊時,以發光、聲 態樣地執行發報。此時,收納具監護裝置 協同動作而成立爲執行爲執行保全功能之 按上述之屬於控制手段1 1之收納具當 感測出有人之對於收納具2之操作,同時 被認定爲由具有正當之權限之使用者以外 以發報者。而與該做法不相同地,在於叱 上設置直接的的可以抑制收納具2之開閉 慮。例如,以控制電路5 d所控制,在於叱 實裝物理的抑制收納具2之開閉之上鎖裝谓 本案中所指之上鎖裝置有:例如以如 由而使收納具2之開閉成爲困難之態樣, 具2用之鎖定螺栓構件之態樣等等。此時 ’介著操作訊號接受部5 3接受爲了解除保 感測出對於收納 在之狀態係應執 ,而設置於控制 部乃,當由感測 段來認證出具有 能發報狀態。並 測出,有對於收 能發訊出表表示 接受了由收納具 音輸出、其他之 5及控制裝置4係 控制手段1 1。 5護裝置5乃一面 執行了該操作係 之使用者時,予 ί納具監護裝置5 之機構也可以考 t納具監護裝置5 L ° 氣球狀地膨脹, 或驅動抑止收納 之控制電路5 d乃 全功能之操作訊 -58- (55) (55)200416552 號,換言之,爲了解鎖之用之操作訊號時,上鎖機構之使 內包之氣球收縮,或驅動鎖定螺栓構件而容許收納具2之 開閉。相反地,無法接受解除保全功能之意旨之操作訊號 時,控制電路5 d係使上鎖機構之氣球膨脹或驅動鎖定螺栓 構件而對收納具2上鎖,換言之,做爲控制手段1 1之收納 具監護裝置5之發報而替代的執行“上鎖”之保全功能。 上述之情形時,不一定實裝有該使用於感測對於收納 具2之操作之感測部5 1。 但是採用:不是接受了解除保全功能之意旨之操作訊 號,而(由控制裝置4所發訊)之應啓動保全功能之意旨 之操作訊號時,執行上鎖機構之氣球(膨脹),或驅動鎖 定螺栓構件以資執行上鎖也可以。 此時,控制裝置4之無線對講機4b係做爲申請專利範 圍第6項或第7項所述之「訊號發訊手段」。而收納具監護 裝置5係相當於「上鎖裝置」也。 順便的提之,做爲顯現保全功能之手段而不用上鎖機 構而安裝對於欲操作收納具2之人之手指之接觸之部位施 加電壓以資禁止人之操作(如電氣柵之方式)之通電裝置 也可以。 此種方式也可以抑制收納具2之開閉也。 替代於收納具監護裝置5,而採用於上述第3乃至第4 實施形態所述之,組裝了由上鎖裝置之收納具2之控制裝 置4所控制之系統也可以。此時之控制裝置4之無線對講機 乃將擔負對於收納具2之上鎖裝置2a而發訊操作訊號之訊 •59- (56) (56)200416552 號發訊手段1 5之職責。並且’介著感測手段1 〇而感測出使 用者之離席時,發訊該爲了執行上鎖裝置2 a之上鎖之操作 訊號,且由認證手段13之認證完了之後,發訊爲執行上鎖 裝置2 a之解鎖用之操作訊號。換言之’當使用者離席時’ 爲了抑制他人之拿出該收納於收納具2內之物品而將收納 具2予以上鎖,然後具有正當之權限之使用者出現後,以 認證手段1 3來認證該使用者之後’解除收納具2之上鎖, 再度可以使物品出入於收納具2 在於該實施形態中’具有上鎖功能之收納具監護裝置 5乃,可以視爲,申請專利範圍第6項或第7項所述之上鎖 裝置地,組入於收納具2之情形。或將組入於收納具2之上 鎖裝置2 a可以視爲,申請專利範圍第1項或第4項所述之「 控制手段1 1」。 加上,當收納具監護裝置5之感測出有對於收納具2有 不正當之操作發生時,可以獲得有不正當操作之事實之資 訊地構成系統爲宜。例如沒有接受解除保全功能之旨意之 操作訊號之情形下,介著上述感測部5 1感測出有人對於 收納具2有操作時,發報部52之控制電路5d係利用無線對 講機5 e之功能對於控制裝置4發訊該「有人做了不正當操 作」之情形。本收納具監護裝置5係,可以說是,當感測 出不經過認證手段1 3之使用者認證而有人做了於收納具2 之操作之事實時,以無線訊號之方式做通報者。 另一方面第20圖表示,在於控制裝置4或與該控制裝 置4連接之電腦6上,設置,生成關於不正當之事實之資 -60- (57) (57)200416552 訊而予以輸出之「不正當存取資訊輸出手段」1 6。 本案中所謂「資訊之輸出」乃指:包含對於顯示器之 畫面之顯示;印刷出;朝向外部之資訊之發訊;對於記憶 器或硬體驅動部或其他記憶裝置之寫入;等等之槪念。 不正當存取資訊輸出手段16之具體構成係將成爲回應 於,關於不正當之事實之資訊之輸出之態樣者。本實施形 態中,乃例如使控制裝置4擔負做爲不正當存取資訊輸出 手段16之職責者。詳述之,以當介著無線對講機4b接受, 由收納具監護裝置5所發來之,表示有不正當操作之旨意 之資訊時,由控制裝置4之控制電路4f (或處理器)生成 關於該不正當操作之事實之資訊。寫入於實裝於該控制裝 置4之記憶器4g,而介著通訊接口 4e朝向電腦6發訊。再朝 向介著電氣通訊電路而與此電腦6通訊可地連接之規定之 資訊處理終端機(不圖示)而發訊該資訊(指示做爲發訊 之收訊址之資訊處理終端機之地址資料係通常預先收納於 控制裝置4之記憶器6b,或補助記憶裝置6c )等之態樣來 實施關於不正當操作之事實之輸出。在於不正當存取資訊 輸出手段16所生成而輸出之資訊中’例如包含’表示被不 正當操作之收納具2之資訊或被實施不正當操作之日期、 時間之資訊。 但是不正當存取資訊輸出手段1 6之設置於電腦6也無 妨。即,由收納具監護裝置5接受了表不被貫施不正當操 作之旨意之資訊之控制裝置4之控制電路4f乃’介著通訊 接口 4e將該旨意通知於電腦6。並且接受通知之電腦6之處 -61 - (58) (58)200416552 理器6a係,依據程式生成關於不正當操作之事實之資訊, 而以:顯示於顯示器6d,寫入於主記憶器6b或補助記憶裝 置6c之規定之記憶領域,或朝向介著電氣通訊電路而與此 電腦6可以通訊地連接之規定之資訊處理終端機發訊,等 等之態樣而輸出。 加上,不正當存取資訊輸出手段1 6乃在於由認證手段 1 3之使用者認證失敗時也可以生成關於該事實之資訊而予 以輸出爲宜。 依本實施形態乃,由於構成了具備有:用於檢測有無 人存在之感測手段1 〇 (人感感測器4a ),及以上述人感感 測器4a之感測出,使用者之離席爲條件,開始執行規定之 保全功能,即畫面處理及/或留保處理之控制手段Η ’及 由上述控制手段1 1之保全功能之在啓動之狀態下,用於認 證回席之人係具有正當之權限之使用者之認證手段1 3 ’以 及由上述認證手段1 3之認證完了後,解除由上述控制手段 1 1之保全功能之控制之解除手段1 4而構成之資訊處理裝置 3 (系統),所以使用者本身不執行煩雜之操作之下’仍 然在於使用者離席時會啓動由控制手段1 1之保全功能。並 且在於保全功能之啓動狀態下,認證了具有正當之權限之 使用者之復歸(回席)之後,才解除,所以可以抑止由他 人之不正當存取,成爲可以擔保保全之裝置。 由於做爲上述控制手段Π之收納具監護裝置5係執行 關於擔保收納具2之開閉之保全之功能’上述控制之解除 手段1 4乃,在於由上述認證手段1 3之認證之完了時’對於 -62- (59) (59)200416552 上述控制手段I 1,發訊該有關於解除保全功能之操作訊號 者,所以在使用者離席之間,可以抑制他人之由收納具2 內不正當的拿出,或閱覽,於是可以安全的將被偷竊之虞 之貴重品或不喜歡他人閱覽之機密文書、收納保管於收納 具2也。 由於做爲控制手段1 1 (收納具監護裝置5 )係對於收 納具2可以裝卸自如,所以使用者可以將隨意的安裝於它 本身所使用之桌子之抽屉、箱子、收藏櫃、皮包等而可期 這些之保全功能之提高也。 如採取:構成爲,具有用於檢測有無人存在之感測手 段1 0,及,對於可能收納種種之物品之收納具2設置之上 鎖裝置,得發訊要它上鎖或解鎖用之操作訊號之訊號發訊 手段15,及在於認證使用者之離席後,回席者之具有正當 之權限之使用者之認證手段,而上述訊號發訊手段1 5之介 著上述感測手段1 〇而感測出上述使用者之離席時,發訊出 爲執行上述上鎖裝置之上鎖之操作訊號,且由上述認證手 段1 3之認證完了後,發訊出爲實施上述上鎖裝置之解鎖用 之操作訊號之資訊處理裝置3 (系統),也可以同樣可以 構築簡便之保全系統也。又上述上鎖裝置係只在接受有解 鎖用之操作訊號時期地處於解鎖狀態者(不能接受解鎖用 之操作訊號時移行至上鎖狀態)時,可以構成爲,上述訊 號送訊發訊手段1 5之介著感測手段1 〇而感測出使用者之離 席時,停止操作訊號之發訊,然後由認證手段1 3執行具有 正當之權限之使用者時,再開始操作訊號之送訊之態樣也 -63- (60) 200416552 可以。 由於再具備:當感測出由上述認證手段1 3之 證不成功(失敗)之事實,或不經由由上述認證 使用者認證的,對於上述收納具2有了操作之事 少一方時。 生成關於該事實之資訊而輸出之“不正當存 出手段1 6 ”所以可能做到對於預定之收訊者,發 關對於電腦6或收納具2之第三者之不正當行爲之 蓄積關於不正當行爲之資訊而事後的供參照也。 其他上述第1及至第4實施形態中所述之效果 當然也可以達成也。 但是,本實施形態並不侷限於上述’各部份 構成係仍然做各種變形。 首先,感測手段1 〇,認證手段1 3之態樣係不 述之例示者。如在於第3或第4實施形態中已述, 證使用者之離席後’出現於工作空間者之具有正 之使用者時’並非接受由使用者本身之使用者識 輸入,而是改爲取得使用者預先持有之記憶於規 裝置Μ之使用者識別資訊也可行。 規定之記憶裝置Μ,可以採用:R F 1D標誌, 無線通訊功能之可攜帶之資訊處理終端機等等。 第2 9圖所示,在於控制裝置4安裝’以無線通訊 所持有之記憶裝置Μ取得使用者識別資訊之無線 4 h。無線通訊裝置4 h之具體態樣乃成爲回應於使 使用者認 手段1 3之 實中之至 取資訊輸 訊出該有 資訊,或 係不用說 之具體的 侷限於上 當在於認 當之權限 別資訊之 定之記憶 具有可以 並且例如 由使用者 通訊裝置 用者所持 -64- (61) (61)200416552 有之規定之記憶裝置Μ之態樣。舉例說明之,如規定之記 憶裝置Μ係電子感應方式之RFID標誌時,將成爲含有使該 R F I D標誌內之感應線圈產生感應電壓用之線圈(天線) 者。規定之記憶裝置Μ係光方式之RF1D標誌時,將含有與 該R F I D標誌實施紅外線通訊之紅外線通訊裝置。或爲了 與攜帶用資訊處理終端機可以通訊之如藍芽(商標)等資 料通訊用對講機也可以。 再者,與規定之記憶裝置Μ實施使用者識別資訊之 授受用之無線通訊裝置4h,及與收納具監護裝置5實施 訊號授受用之無線對講機4b乃別個者也可或同一者也可以 〇 加上,如果規定之記憶裝置Μ係在於與使用者一齊存 在之前提條件存在時,感測有無規定之記憶裝置Μ之存在 ,與感測有無使用者之存在乃將是同意義。所以執行有無 人之存在之感測手段1 〇與實施使用者之認證之認證手段13 就可以共用同一硬體資源。詳述之,利用與規定之記憶裝 置Μ實施無線通訊之無線通訊裝置4h來構成感測手段1 0 ,當與規定之記憶裝置Μ之通訊斷絕時,認爲使用者不存 在通訊之確立時,即可以認爲使用者存在。此時,由於規 定之記憶裝置Μ及無線通訊裝置4h係成爲本發明之感測手 段1 0及認證手段1 3之要素,所以在於控制裝置4不必要實 裝人感感測器4a,輸入裝置4d。當然(第29圖上未圖示) 實裝輸入裝置4d,而使之選擇的可以實施使用RFID標誌 等之記憶裝置Μ之認證及使用者本身之介著輸入裝置4d而 -65- (62) (62)200416552 輸入密碼等之使用者識別資訊之認證也可以。採用如方式 時’假如沒有攜帶記憶裝置Μ時’仍可以使用輸入密碼而 實施使用者認證,由而解除有關於收納具2之保全功能( 不正當操作感測及發報功能),由電腦6之保全功能(畫 面處理、留保處理)等成爲得解除保全之系統。 再者,如第3 9圖所示,在於收納具監護裝置5實裝由 使用者所持有之記憶裝置Μ取得使用者識別資訊用之無線 通訊裝置5 f也可以。此時,使用者認證處理乃不使用控制 裝置4來執行而以收納具監護裝置5來執行。 如前面所述,該收納具監護裝置5係具備有第3 9圖所 示之光感測器5a,發光裝置5b及/或聲音帶出裝置5c,控 制電路5d等之硬體資源,而擔負有關於收納具2之保全功 能之控制裝置11 (感測部5 1,發報部5 2之職責)。加上該 控制電路5d乃(有時係電腦或由該電腦所解讀執行之程式 係有時乃收納於下述記憶器5 g )控制無線通訊裝置5 f,而 與使用者所持有之規定之記憶裝置Μ之間,實施使用者識 別資訊之授受。另一方面,以總線連接控制電路5 d之記憶 器5 g之規定之記憶領域內預收納有,有關於具有正當的權 限之使用者之使用者識別資訊。並且,控制電路5d乃比較 ,由規定之記憶裝置Μ讀出之使用者識別資訊,與收納於 記憶器5 g之具有正當之權限之使用者之使用者識別資訊, 而判斷該具有記憶裝置Μ之人是否係正當之使用者。被判 斷爲記憶裝置Μ之持有者係正當之使用者時,即解除有關 於收納具2之保全功能。換言之感測部5 1感測出有關於 -66 - (63) (63)200416552 收納具2之操作時’也不執行由發光裝置513及/或聲音輸出 裝置5 c之發報。 控制裝置5 d係,介著無線通訊裝置5 f而與上述記憶裝 置Μ間歇的或連續的交訊(由記憶裝置μ取得使用者識別 資訊之時機係可以適當地變更)。而取得該記憶裝置Μ所 記憶之使用者識別資訊。而逐一的確認(查證)該使用者 是否係具有正當之權限之使用者。在於無法接受有關於具 有正當權限之使用者之使用者識別資訊時,認定爲使用者 離席而開始執行有關於收納具2之保全功能,相反地如果 成爲能接受有關於具有正當權限之使用者之使用者識別資 訊時即認定爲使用者回席或復歸,而解除有關於收納具2 之保全功能。換言之利用與規定之記憶裝置Μ實施無線 通訊之無線通訊裝置5 f而構成感測手段1 0。又此時無線通 訊裝置5 f及實施使用者識別資訊之比較之控制電路5 d乃成 爲有關於本發明之認證手段1 3之要素。以及控制發光裝置 5b,聲音輸出裝置5c之控制電路5d係成爲解除保全功能之 控制之解除手段1 4。此方式時,即由於不依賴於控制裝置 4而可以實施保全功能之啓動/解除,所以不須與控制裝置 4組配地,單獨的可以使用。 再者,在於對應於複數之使用者地,在於各自之工作 空間配置有複數之控制裝置4,又連接這些控制裝置4之各 電腦6係介著電氣通路電路(回線)而連接可能地連接時 ,介著實裝於控制裝置4之感測手段1 〇所感測之有關於使 用者之在席/離席之資訊,也可能發訊至其他使用者之電 -67- (64) 200416552 腦6。 此時之電腦6係依照程式,發揮將關於使用該電月 使用者之現況之資訊朝向其他之使用者發訊之現況資 訊手段之功能。 某一使用者之電腦6乃通常將關於對於其他之使 之電腦6發訊出資訊之收訊地址(有時指示其他之使 所使用之電腦6本身之地址,或有時指示朝向其他之 者發訐資訊時,做爲中繼之不圖示之電腦之地址)之 記憶於主記憶器6b或記憶於補助記憶裝置6c。並且’ 感測手段1 〇而感測出使用者之離席時,將表示該使用 離席之資訊發訊至本身所記憶之收訊地址,由而報知 他之使用者。又以認證手段1 3而確認具有正當之權阳 用者時,也對於本身所記憶之收訊地址發訊該表示偯 所復歸之資訊,由而可以報知於其他之使用者也。 又,本發明乃不限定於上面所詳述之實施形態, 是本發明乃不限使用於個人電腦、工作站、或P D A, 也可以適用於DVD放影機、硬體視頻錄影機、視頻連 等。 其他各部份之具體的構成,或於第6圖、第9圖、 圖、第17圖、第26圖、及第27圖之流程圖所示之處理 序乃並不侷限於上述實施形態,在不逸脫本發明要_ 圍內可以做種種之變形。 (產業上之利用可能性) g 6之 訊發 用者 用者 使用 資訊 介著 者之 於其 之使 用者 特別 例如 戲機 第14 之程 之範 •68- (65) (65)200416552 依上述詳述之本發明不需隨伴煩雜之操作地可以構築 必要時可以啓動以螢幕保護所代表之保全功能之資訊處理 裝置也。 【圖式簡單說明】 第1圖表示本發明之一實施形態之資訊處理裝置之硬 體資源構成圖。 第2圖表示同實施形態之資訊處理裝置之功能方塊圖 〇 第3圖表示顯示資訊之畫面之例示圖。 第4圖表示由控制手段之畫面處理之例示圖。 第5圖表示督促藉由認證手段之使用者識別資訊之輸 入之指不(輸入對話顯示)之例示圖。 第6圖表示同實施形態之處理之程序之流程圖。 第7圖表示模式的表示本發明之一實施形態之資訊處 理裝置之圖。 第8表示同實施形態之資訊處理裝置之硬體資源構成 圖。 第9圖表示同實施形態之處理之程序之流程圖。 第1 0圖表示本發明之構成說明圖。 第11圖表示本發明之構成說明圖。 第1 2圖係模式的表示本發明之一實施形態之資訊處理 裝置之圖。 第1 3圖表示同實施形態之資訊處理裝置之硬體之資源 -69- (66) (66)200416552 構成圖。 第1 4圖表示同實施形態之處理之程序之流程圖。 第1 5圖係模式的表示本發明之—實施形態之資訊處理 裝置之圖。 第1 6圖表示同實施形態之資訊處理裝置之硬體資源構 成圖。 第1 7圖表示同實施形態之處理之程序之流程圖。 第18圖表示本發明之構成說明圖。 第19圖表示本發明之構成說明圖。 第20圖表示本發明之構成說明圖。 第2 1圖表示組合了人感感測器及距離感測器之感測手 段之電路構成圖。 第2 2圖例示同感測手段之動作之時序表。 第2 3圖係模式的表示本發明之一實施形態之資訊處理 裝置(系統)之圖。 第2 4圖係在於同實施形態之收納具監護裝置之硬體資 源構成圖。 第25圖係在於同實施形態之控制裝置之硬體資源構成 圖。 第2 6圖表示同實施形態之處理之程序之流程圖。 第2 7圖表示同實施形態之處理程序之流程圖。 第28圖表示同實施形態之電腦之硬體資源構成圖。 第2 9圖係同實施形態之控制裝置之硬體資源構成圖。 第3 0圖係表示收納具監護裝置之電源電路之一例之電 •70- (67) (67)200416552 路圖。 第3 1圖係模式的表示同實施形態之資訊處理裝置(系 統)之圖。 第3 2圖表示同實施形態之收納具監護裝置之圖。 第3 3圖表示同實施形態之收納具監護裝置之斜視圖。 第3 4圖表示設定鍵及雙列直插開關之要部斜視圖。 第3 5圖表示設定鍵及雙列直插開關之要部斜視圖。 第3 6圖表示設定鍵及雙列直插開關之要部縱剖面圖。 第3 7圖表示設定鍵及雙列直插開關之要部水平剖面圖 〇 第3 8圖表示設定鍵及雙列直插開關之要部水平剖面圖 〇 第3 9圖表示同實施形態之收納具監護裝置之硬體資源 構成圖。 【符號說明】 1 資訊處理裝置 la 處理器 lb 主記憶器 lc 補助記憶裝置 Id 顯示器 le 顯示控制裝置 1 e 1視頻晶片 le2視頻記憶體 -71 - (68)200416552200416552 (1) 发明. Description of the invention [Technical field to which the invention belongs] The present invention relates to the implementation of: using a so-called "screen saver" function of a computer or the like to perform security (Security and Security) (Security) function for the device. [Previous technology] In order to prevent burnout of the display connected to a computer, many of them are installed on the computer. When there is no access for a certain period of time, the screen is erased or a predetermined illustration or other program is displayed. This is generally called screen protection. In addition, when the screen saver process returns to the normal state, it is required to enter a "password". If you fail to enter a positive password, the screen saver state cannot be released, which is known (for example, refer to Japanese Patent Laid-Open No. 09- 297676). The lock on the screen saver by "password" can prevent users with normal permissions from accessing the computer when the user is away. However, screen savers will not be activated until a certain standby time has elapsed for the existing screen saver components. Furthermore, multiple procedures are required to manually activate the screen saver. In other words, in order to activate the screen saver at the timing desired by the user, complicated operations are required, and this matter is particularly a problem when an emergency occurs and the user needs to leave the seat immediately. If it is too complicated to leave the screen without activating the screen saver, that is -5- (2) (2) 200416552 After the specified time has elapsed, people other than the user can freely access the computer. It is impossible to guarantee security (confidentiality and security). The present invention is the first to focus on the above problems. Provides an operation that will not be accompanied by complication, but can be activated when necessary, with the purpose of the security function represented by screen saver. [Summary of the invention] 1 In view of the above-mentioned problems, the present invention is shown in FIG. 18, and has a detection means 10 for detecting the presence of a person, and a detection method using the above-mentioned sensing means 10 As a condition of leaving the user's seat, the control means π that starts to implement the predetermined security function, and in the state where the security function of the above control means 11 has been activated, the person used for authentication has proper authority. The user's authentication means 13 and the information processing device composed of the cancellation means 14 controlled by the security function of the control means after the authentication by the authentication means 13 is completed. In other words, the presence / departure of the user is sensed, and when the user leaves the seat, the prescribed security function can be activated immediately, and in the state where the security function has been activated, the user is required to release the state Certified system. With such a structure, the user does not need to perform one-by-one complicated operations when he leaves the seat, and can guarantee the security when he is not present. There are many kinds of security functions to be implemented by the present invention. However, it is typical to prevent abnormal reading of information stored in personal computers, etc. -6- (3) (3) 200416552, to prevent improper operation of personal computers, etc. Therefore, the above-mentioned control hand lx 1 1 is necessary to implement the processing of concealing (hiding) the information displayed on the surface of the day with a security function, or to refuse the operation by anyone other than a user with proper authority. As shown in FIG. 10, the information processing device for displaying information on a screen of a display by using text, an image, an image, or a combination thereof is provided so that it has a sensing function for detecting the presence of a person. Means 0, and at least a control device 11 that has a function to perform screen processing for hiding information displayed on the screen, and when sensed through the sensing means 10 described above, a user using the information processing device When leaving the seat, start the control activation means 12 using the screen processing of the above control means 11 and when the screen processing by the above control means 11 is in the activated state, it is used to authenticate the person who intends to use the information processing. Authentication means 13 'of the facts of users with proper authority and the information processing composed of the release means 14 which releases the control of the screen processing of the above control means after the authentication by the above-mentioned authentication means 13 is completed When the device is installed, that is, when the user leaves the seat, the content of the information in the activation of the screen processing of the control means 11 can be hidden, and it is located at the startup screen. Under the state certification of the fact that the user has reverted to the legitimate authority after the lifting of the above picture processing, it can once again become a display, so you can become inhibited by the improper reading of information while others can guarantee preservation. The term "screen processing" refers to the screen display processing for hiding (hiding) the information displayed on the screen, or the erasing screen processing. Similarly, the information processing device (4) (4) 200416552 that can perform various types of information processing is provided with: a sensing means 10 ′ for detecting the presence of a person and at least a device for performing information processing. The control means 11 of the function of the retention processing of the accepted acceptance of the operation, and when the user using the information processing device leaves the seat via the above-mentioned sensing means, the control by the above-mentioned control means 11 is activated. Control activation means 12 for retention processing, and authentication means for authenticating a user who has the right to use the information processing device in a state where the retention processing is activated by the above control means 1 1 And after the completion of the authentication by the above-mentioned authentication means 13, the cancellation means 14 of the above-mentioned control means's retention processing can be cancelled, and the information processing device constituted can also be used without requiring complicated operations for the users themselves Land can restrain the unauthorized access by others and guarantee its preservation. The so-called information processing refers to the consideration of information viewing or viewing, production, modification, storage, transmission and reception, and implementation of various other programs. Other examples of the security function that the present invention intends to implement refer to storage devices that may store various items. (The storage device referred to in this case is a concept that includes all appliances that can store items, such as a drawer that can include a table, Vehicles, storage cabinets, storage boxes, purses, etc.), while inhibiting third parties from opening and closing the storage device. The control means 11 at this time is to perform the function of maintaining the opening and closing of the storage device that may store various items for security. The cancellation means 14 of the above control is for the above-mentioned control means 11 to send a message to the above-mentioned control means 11 for the purpose of cancelling the warranty. 8- (5) (5) 200416552 Full-function operation Signal information processing device. The security function implemented according to the control means 11 is to implement the storage device other than the user under the condition that the user with proper authority leaves the seat 'in other words, to prevent the user from leaving the storage device. The handling of opening and closing. More specifically: (1) Physically inhibit the opening and closing of the storage device (locking, electrical grid, etc.), or, (2) send out an alarm process when it detects improper operation of the storage device (through use) Or other persons to give notifications, alert to improper conduct for bullying, etc.). The specific content of the control means 11 becomes the content in response to the implemented security function. In this way, because it can be suppressed, when the user is away from the table, someone may take out the contents of the storage device or read it improperly. Therefore, it is safe to store the valuables that may be stolen, or to keep confidential documents or other items that are not intended to be viewed by others in storage. The control means described above may be configured to be detachably attached to the storage device. If the installation and removal method is adopted, the user can arbitrarily install the drawer or purse on the table used by himself to improve the security. Furthermore, if the structure shown in FIG. 19 is used, it has : Sensing means 10 for detecting the presence of people, and signal transmission for the locking device installed on a storage device that may store various items, which may send an operation signal for implementing the locking or unlocking Means 15 and authentication means 13 used to authenticate 'the absence-9- (6) (6) 200416552 returnees who are returnees and have proper authority, the above-mentioned signal transmission means 15 That is, when the absence of the user is sensed through the sensing means 10, the operation signal of the implementation of the locking device is signaled, and when the authentication means 13 is completed, the signal is sent to An information processing device constituted by unlocking the operation signal of the above locking device. It can also constitute a simple security system. In addition, if the locking device is only between receiving the operation signal for unlocking, it becomes the unlocked state (when the operation signal for unlocking cannot be accepted (receiving), that is, it is moved to the locked state), that is, the above signal When the user's absence is detected through the sensing means 10 through the sensing means 10, the sending of the signal is stopped, and then the user with proper authority is authenticated by the authentication means 12 , Will open the way of operating the signal. Also, as shown in FIG. 11. The information processing device that can perform the above-mentioned screen processing and / or retention processing is further provided. The locking device provided on the storage device that may store various items may be informed of the operation signal for implementing the locking or unlocking. Signaling means 15 is appropriate. The above-mentioned signal transmitting means 15 is, when it is sensed via the above-mentioned sensing means 10, that when the user of the information processing device leaves the seat, the operation signal for implementing the locking of the above-mentioned locking device is signaled. And after the authentication by the above-mentioned authentication means 13 is completed, the signal is constituted to implement the operation signal for unlocking the above locking device. At this time, on the one hand, it is possible to protect digital information stored in a personal computer and the like, as well as "conversation" information such as pictures and drawings stored in a storage device. -10-(7) (7) 200416552 Also, as shown in Fig. 20, it is provided with: at least it senses that the user authentication failed by the user authentication means 13 of the above authentication means 13 failed. When any of the facts, or the fact that the storage device has been operated without user authentication by the above-mentioned authentication means 13, is generated by improper access to the information output means 16 which generates information about the fact and outputs it It may be possible to report the information about the improper behavior of a personal computer or storage device by a third party to the specified address and report the improper fact. Or Accumulate information on misconduct for future reference. The failure of user authentication by the so-called authentication means 13 refers to the failure of obtaining user identification information to identify users with proper authority. For example, when the authentication means 13 accepts the user's user identification information and accepts the input, the user authentication is performed with a specified number of input errors as a general failure. In addition, in the existing screen saver module, in order to display the dialog for inputting the unprotected language on the screen, it is necessary to move the mouse or press a key. This operation is only to stop the screen saver, and it has no meaning other than displaying the input dialog, but it is more troublesome for the user. Relatively, the authentication means 13 is made as above, and is sensed through the sensing means 1 〇 When anyone approaches, an instruction is issued to the person to enter the identification information to identify the user with proper authority. At the same time, the above operation can be omitted when the input is acceptable. Or use the above authentication means 13 as: wirelessly implement a memory device that memorizes the requirements of the information processing device -11-(8) (8) 200416552 for identifying the user's identification information Communication, and the user identification information is obtained by the above-mentioned memory device, and when it is used to identify the user with proper authority, the input operation of the user identification information by the user itself can be omitted and become More convenient way to use. The "prescribed memory device" generally refers to a person who has a function of memorizing user identification information and a function of wirelessly transmitting the memorized user identification information. For example, RFID (Radio FreqUeney IDentification: recognition method for recording or reading information using electromagnetic waves for recording media such as a card or a tag), equipped with a tag, or a portable information terminal for a wireless communication device, or Mobile phone terminals should be treated as others. [Embodiment] < First Embodiment > An embodiment of the present invention will be described with reference to the drawings. The information processing device of this embodiment, for example, as shown in FIG. 1, includes a processor 1a, a main memory 1b, an auxiliary device 1c, a display 丨 d, and a display control device! e, and hardware resources such as input devices connected through the input and output interface lh, human sensor lg, etc., and existing personal computers, workstations, PDAs (Personal Digital Assistants), etc., use information to textual portraits , Images, or a combination of these are displayed on the screen, and various information processing can be implemented to construct them. The auxiliary memory device 1c is, for example, a hard disk drive, a flash memory, a -12- (9) (9) 200416552 DVD-ROM, etc., and others, and the information processing device can be installed and removed freely, in other words, a card A cassette-type memory card, a non-contact 1 (: card, or an externally mounted disc drive, etc.) is not a problem. The display control device 1 e has: generated according to the scan date accepted by the processor 1 a. The video file 1 e 1 (or image film) of the function of sending the portrait data to the display id, the video memory le2 (Video RAM) and other known devices, which are responsible for temporarily storing the portrait data, etc. The input device 1 f is used by the user for operation input, and may be represented by a keyboard, a mole, a track pad (Truckpad), etc. The human sensor 1 g is responsible for detecting near the information processing device. In the specified field, there is the role of sensing means 10 for the existence of no one. As a human sensor 1 g, various methods can be used. Passive IR sensors that detect infrared rays emitted by the human body are Typical human sensor 1 g, but methods other than passive IR sensors can also be used. For example, sensor method 10 is a camera that photographs the surrounding area and analyzes the image to detect the presence of people. Usually, it is processed by The program to be implemented by the device 1 a is stored in the auxiliary memory device 1 c. When the program is implemented, the auxiliary memory device 1 c is read from the main memory 1 b, read by the processor 1 a, and according to the program The above hardware resources are activated so as to perform the functions of the control means 1 1 ′, the control start means 12, the authentication means 13, and the control deactivation means 14 shown in FIG. 2. The control means 1 1 has the following functions: Implement the function of hiding (hiding) the screen processing of the information displayed on the screen, and the function of retaining the insurance for the acceptance of the operations of the Information Office -13- (10) (10) 200416552. The control means 11 is, for example, possible It is constituted by a familiar screen saver module program. By activating the screen saver module program, the screen currently being displayed can be hidden and the acceptance of the warranty operation can be retained. The illustration of the information on the display 1 d is illustrated in Figure 3 'At the same time, the state in which the display screen shown in FIG. 3 is concealed (illustrated) is shown in FIG. 4. As one of the screen processing modes by the control means 1 1, the power of the display 1 d can be adopted. The method 'in other words, the display may be turned off. The control and activation means 1 and 2 are used to sense that the user who is currently using the information processing device is leaving the seat' in other words when the user senses 1 g of the sensor. When leaving the information processing device, the screen processing and retention processing by the above-mentioned control means 11 are started. The control means 12 is, for example, counting the person's sensor 1 g with a timer without detecting the presence of the user. When the elapsed time exceeds the predetermined arrival time, it is determined that the user has left the seat and the control by the borrowing control means 11 is started. The authentication means 13 is the fact that under the activated state of the acceptance of the screen processing and operation of the control means 11 to authenticate, the fact that the person using the information to process the device has a proper authority is authenticated. The authentication is performed, for example, in the form of user identification information that is required to be input for a person who wants to use the information processing device to identify a user with proper authority. Regarding users with proper authority, the user identification information is stored in advance (in plain text or encrypted) in the prescribed memory area of the main memory 1 b or the subsidy device 100 c, or communication may be connected to the Information Processing -14- (11) 200416552 Device stipulated in the main memory of the computer (not shown) or the prescribed area of the supplementary note. The input device is used for authentication! Compare it with the loser's identification information. In this embodiment, the use information is input to the user through the input device 1 f] and / or. It is also possible that the user ID and / or password are the same as or different from the ID or password of the user account currently using the device. The user identification information is not the user ID or password, so for example, biochemical measurement data based on the characteristics of the body (such as fingerprints, voiceprints, patterns of the omentum, patterns of iridescence, patterns of blood vessels) are implemented as other information Biochemical measurement certification is also possible. At this time, a device for inputting biochemical measurement data is set in advance on the device. When means 1 to 3 are used, multiple authentications are also possible. Moreover, the authentication means 13 is that when the approach of a person is sensed through a human sense under the state where the above-mentioned control hand screen processing and retention processing are activated, the input for the person has a positive limit. It is advisable that the user identification information of the user is accessible at the same time. Instructions for urging the user to input the identification information Various user interfaces are provided by screen display, sound output, and style. This embodiment adopts a method in which user identification information is requested to be displayed on a display: a user ID and / or a password is used to accept the input. Figure 5 illustrates a display requesting input of a user ID and / or password. The means for releasing control 14 is the processing of the messenger identification password entered by the authentication device 13 of the recall device, but the user's handwriting user identification δ is processed and then the tester 1g of the authentication section 1g is entitled This loss is displayed through the ID of the other party, and at the same time the dialogue authentication of -15- (12) (12) 200416552 is completed, and the screen processing and retention processing by the control means 11 are cancelled. In this embodiment, the screen saver function is used to restore the screen displaying the information according to the screen saver, and then the operation is started. However, the functions of the control means Π, the control activation means 12, the authentication means 13, and the control release means 14 are shared among a plurality of devices, and the above-mentioned information processing is established by these assistance actions. The situation of the device is also. The supplementary description of the sensing means 10 is described below. According to the passive IR sensor system, the existence of the moving body is detected by detecting the displacement of the moving body. Therefore, if the user performs operations with little physical movement or is at rest, it is impossible to detect its existence stably. As a method to solve this problem, a sensing method using a combination of two sensors, a passive IR sensor (a pyroelectric human sensor) and a distance sensor (a reflective sensor), may be considered. 1 0 . The former is the movement of the user's body or other objects detected within the detection range. The latter is the detection of the presence of users or other objects within the detection range. Fig. 21 shows a circuit configuration diagram of the sensing means 10 combining these sensors. Fig. 22 shows a timing chart for explaining the operation of the sensing means 10. A passive IR sensor detects an output that becomes ON (HI). Basically, when the output of the passive IR sensor or the output of the distance sensor is 0 N, it can be determined that the user is on the seat. When the output of the passive 1R sensor and the output of the distance sensor both show 0FF (L0), it can be judged that the user has left the seat. However, since the outputs of both sensors show 0 F F until a predetermined holding time has elapsed, the output of the sensing means 10 is maintained to be displayed. It is advisable for the user to be in the presence state. In other words, the flip-flop of FIG. 21 is held until the holding time elapses after -16- (13) (13) 200416552, and the state (H 1) indicating the meaning of being present is maintained. After the hold time has elapsed, it is switched to a state (LO) indicating that the user is away from the seat, but it is not necessary to set the hold time to zero (0). In addition, after the user's absence is detected, the condition that the user can be judged to be the user or not the user's return is that the conditions for the output of the passive IR sensor and the output of the distance sensor are specified. Both are showing (0N). When the user or non-user is seated on the original seat again, it is impossible for the passive IR sensor to fail to detect the situation, and if the distance sensor is not used, it is difficult to judge whether the For those who pass by. As described above, the sensing means 10 is not limited to the use of a human sensor 1 g, but as a specific example thereof, it can be mentioned that a sensor is provided on a house or a device used by a user. Like this. Specific examples include 'a sensor for static electricity or temperature from the human body on the top plate of a table', a pressure sensor on the backrest or armrest of a chair, and the like. At this time, the signal output from the sensor will also be accepted by the information processing device through the wired or wireless local. The following describes the processing procedure performed by the information processing apparatus of this embodiment with reference to the flowchart in FIG. When it is detected through the human sensor 1g, the user using the information processing device leaves the seat (step si). The screen processing by the control means 11 is started (step S2), and the retention processing by the control means 11 is started (step S3). In addition, in the state where the screen processing and the retention processing of the control means 11 are activated, when any person approaches the information processing device through the human sensor 1g (step S 4) ' (14) 200416552 is issued to the person to input a user identification instruction for identifying a user with proper authority (step S5), and input of user identification information is accepted). As described above, the present embodiment is based on the above-mentioned steps. On the screen of the display 1d, the user identification information and / or password input dialog D is displayed. Therefore, the input of the user ID and / or the password using the input device is accepted. After the above-mentioned person completes the input of the usage information (step S 7), the comparison is made between the entered usage information and the usage information of the user with proper authority stored in advance, and the user authentication is implemented. If the authentication is possible, the user who wants to process the device is a user with proper authority (step release the screen processing by the control means 11 (step S 9). And the retention process of the release means 11 (step S 1 0) In the case that the above-mentioned step S8 cannot be authenticated, if it has the proper authority, it will urge the user to enter the user identification information again. It is not shown in Fig. 6, but when the input dialog D is displayed and the user ID and password ( Steps S5 and S6), when the predetermined timing has not elapsed, or when the "Cancel in input dialog D" button is pressed, the input dialog D will be cancelled and the screen protection status will be restored. The above-mentioned step S2 may also be processed at the stage. According to the present embodiment, since it is constituted with: a sensing means 1 for human presence (human sensor 1 g) and a sensor 1 g's detection of the user's absence as a condition, and the security function started is the implementation of the screen processing and / or retention processing control information (steps S 6 S5, user identification of users 1 D and 1 f Consumer identification Other resources use this step S 8). Except for the controlled user, although it is configured while waiting for input to be entered, “the original step is to start the detection of step S 3 and implement the predetermined means 1 1 -18- (15 ) (15) 200416552, and in the state where the security function of the above control means 11 is activated, the test means 13 for authenticating the returning person is a user with proper authority, and is based on the above authentication After the authentication of the means 13 is completed, the information processing device constituted by the control releasing means 14 of the security function of the control means 11 is released. Therefore, the user does not need to perform complicated operations when the user leaves the device. At the time of the agent, the security function by the control means 11 will be activated. After the security function is activated, after the return of the authenticated user with proper authority is implemented, the release will be implemented, so it will be suppressed by unauthorized access and can be guaranteed. Security device. In addition, information is used as an information processing device that can be displayed on the screen of the display Id with text, portraits, images, or a combination of these. With: sensing means 10 for detecting the presence or absence of people (ie, human sensor 1 g), and control means with at least the function of processing the screen to conceal (hide) the information displayed on the screen 11, and when it is sensed via the human sensor 1g that the user using the information processing device leaves the seat, the control activation means 12 of the screen processing by the above control means 11 is activated, and by the above control In the state where the screen processing of the means Π is activated, the authentication means 13 for authenticating a user who has the proper authority to use the information processing device, and the completion of the authentication by the above authentication means 13 is terminated. The above-mentioned control means 11 of the picture processing control release means 14, so the user does not need to perform complicated operations. 'When the user leaves the seat, the screen processing of the control device 11 is activated to hide the information. content. And in -19 · (16) (16) 200416552, when the screen processing is started, after the authentication of the return of a user with proper authority is implemented, the screen processing is cancelled to make it possible to display information again, thereby suppressing the The reading of improper information by others becomes a device that can guarantee security. Similarly, an information processing device capable of performing various types of information processing is configured to have: a human sensor 1 g for detecting the presence or absence of a person, and at least the function of the retention processing accepted by the retention insurance for the implementation of information processing operations When the absence of the user using the information processing device is sensed via the human sensor 1 g described above, the control activation means 1 2 of the retention processing of the above control means 11 is activated. And in the state of activation of the retention guarantee processing by the above-mentioned control means 11 in the activated state, the authentication means 13 who intends to use the information processing device is a user with proper authority, and the authentication by the above-mentioned authentication means 13 After the completion, the control release means 14 controlled by the retention means of the control means 13 will be released. Therefore, the user does not need to perform complicated operations. When the user leaves the seat, the control means 11 implements a retention guarantee for the operation. In addition, by verifying the return (return) of a user with proper authority and canceling the retention of acceptance operation, the unauthorized access by others is suppressed to become a device that can be secured. Furthermore, the above-mentioned authentication means 13 is an instruction to input the user identification information for urging the identification of a user having a proper authority when a person is approached due to the human sensor lg being sensed, At the same time, the input can be constituted by the user, so it can be omitted. In order to stop the screen saver, and press the keys used to display the input dialog D, the complicated operations of mouse movement, etc. -20- (17) (17) 200416552 Therefore, 'the information processing device in this embodiment is suitable for use in a state where the hands of unspecified people can be involved, especially because the salesperson can be stationed at any time. Temporary desks, Internet cafes, and other places are very suitable (safe) use. < Second Embodiment Mode > The second embodiment mode described next is in a state where a screen saver is activated on the information processing device 1, in other words, in the activated state of the above-mentioned screen processing and the above-mentioned retention processing, in order to authenticate the intended use of information The person processing the device 1 is a method of a user having a proper authority. Instead of the mode shown in Fig. 7, the method of wirelessly receiving (receiving) user identification information is provided by the user's pre-registered 100 million devices. The following description focuses on differences from the first embodiment. In this embodiment, the RFID tag is used as a prescribed memory device 〇 According to the RFID tag, wireless communication can be performed, and a non-contact recording medium that can read or rewrite data can be implemented. The RFID methods include: electromagnetic induction method (the method of communicating with the RFID mark while supplying power to the RFID mark while using electromagnetic induction), and microwave method (the method of communicating with the RFID mark using a microwave band). Optical method (method of communicating with an RFID tag using light waves such as infrared rays and other methods. There is no limitation on which method is used. In order to prevent the legacy, a prescribed memory device M, such as a badge, etc. It can be convenient to bring it on your body. However, the specified memory device M is not limited to RFID ', but you can also use a portable information processing terminal with -21-(18) (18) 200416552 with wireless communication function, especially if it has a Bluetooth Buds (trademarks) and other data communication devices can also be used as the specified memory device M for interphones and mobile phones, etc., and on the specified memory device μ, pre-memory user identification information for identification of the held user. On the other hand, the information processing device of this embodiment is, for example, as shown in the figure below, and will include: processor a, main memory 丨 b, auxiliary memory device 1 c, display 1 d, and display control. Hardware resources such as device 1e and input device 1f connected via _in / out interface 1n, human sensor 1g, etc. Wireless communication device Π for communication. The specific aspect of the wireless communication device 1 i is to respond to the prescribed memory device M possessed by the user. For example, if the prescribed memory device M is When the RFID tag is electronic induction, it will become a coil (antenna) that generates an induced voltage to the induction coil in the R FI D mark. When the RFID system of the 5th memory device M is optical, it will be included. An infrared device that performs infrared communication with the RFID. Generally, the program to be implemented by the processor 1 a is stored in the auxiliary memory device 1 c ′. When the program is implemented, the auxiliary memory device 1 c is read from the main memory ib ο to The processor 1a interprets it and activates the above-mentioned hardware resources according to the program to be used as the control means 1 1, the control start means 12, the authentication means 13, and the control release means 1 4 shown in FIG. 2. The function of the control means 11 1 'control activation means and release of control. Means 14 have to be configured in the same manner as in the first embodiment, so in this example -22- (19) (19) 200416552 The detailed description will be omitted. The authentication means 13 is to authenticate the person who intends to use the information processing device 1 under the condition that the screen processing of the above control means 11 and the acceptance of the operation acceptance are activated. The fact of the user. The authentication is to obtain user identification information from the specified memory device M held by the person who wants to use the information processing device !, and to identify the user with proper authority. The comparison of user identification information is implemented. User identification information about users with proper authority is stored in advance (in plain text or encrypted) in the main memory 1 b or the auxiliary memory device 1 c It is stored in a prescribed memory area or in a prescribed memory area of a main memory or an auxiliary memory device of a prescribed computer (not shown) which can be communicatively connected to the information processing device 1. The authentication means 13 uses the wireless communication device 11 to perform wireless communication with the prescribed storage device M to receive user identification information stored in the prescribed storage device M. However, it does not prevent the control device 11, control activation means 12, authentication means 13, and control release means 14 from sharing the plural parts, and the above information is established by the coordinated actions of these Processing device 1. Furthermore, if it stands on the premise that the specified memory device is with the user, detecting the existence of the specified memory device M is synonymous with detecting the existence of the user. Therefore, it is also feasible to use the same hardware resources as the sensing means 10 for detecting the presence of a person and the authentication hand -23- (20) (20) 200416552 for user authentication. In other words, instead of using the human meditation and the sensor 1g to form the sensing means 10, the wireless communication device 1 that implements wireless communication with the specified memory device M is used to form the sensing means. When the communication of the memory device M is interrupted, it is determined that the user does not exist (absent). At this time, the prescribed memory device M and wireless communication device will be the elements that constitute the sensing means 10 and the authentication means 13 of the invention. The human sensor lg becomes unnecessary. The following describes the processing procedure performed by the information processing apparatus 1 according to this embodiment with reference to the flowchart in FIG. When the sensing means 10 detects that the user using the information processing device is away (step S11), the screen processing by the control means π is started (step S 1 2), and the control means 1 1 is started. The retention processing (step S 1 3) is then in the state where the screen processing of the control means 12 and the retention processing have been activated, and the person who wants to use the information processing device 1 is between the specified memory devices M held by him. Come to establish wireless communication. When wireless communication is established with the specified memory device M (step S 1 4), the user identification information stored in the specified memory device M can be obtained (step S 1 5), and the acquired user will be obtained. The identification information is compared with the user identification information stored in advance about a user with proper authority to implement user authentication. If it can be authenticated that the person who wants to use the information processing device 1 is a user with proper authority (step S 1 6), the control means will be released; [i's screen processing (step S 1 7), and the control means 1 will be released. Retention Office of No. 1-24- (21) (21) 200416552 (step S 1 8). In the case where the user with proper authority cannot be authenticated in step S 16 above, that is, the screen processing and the control processing are not implemented 'to restore the activation state of the screen saver. In other words, it returns to the step S 1 2 ′ and step s 1 3 described above. According to this embodiment, a human sensor 1 g ′ having sensing means 10 for detecting the presence or absence of a person is provided, and the user's separation is detected by using the human sensor 1 g. To implement the required security functions, that is, the control means 11 for screen processing and / or retention processing, and to implement authentication under the activation status of the security function of the above control means 11 'returnees have proper authority After the authentication of the user's authentication means 13 and the completion of the authentication by the above-mentioned authentication means 13 ', the information processing device 1 of the release means 14 which releases the control of the security function of the above-mentioned control means 11 1. Therefore, the user does not need to perform complicated operations. When the user leaves his seat, the security function of the control means 11 is activated. In addition, after the security function is activated, after the authentication of a user with proper authority is performed, the release is implemented. Therefore, it becomes a device that prevents unauthorized access from becoming a security guarantee. In addition, the information processing device 1 that uses information as a text, an image, an image, or a combination of these and can display it on the screen of the display 1 d is configured to include: a sensing means 10 for detecting the presence or absence of a person; (That is, human sensor 1 g), and at least a control means 1 1 'having the function of performing screen processing of concealing (hiding) the information displayed on the screen, and 1 g -25- ( 22) (22) 200416552 It is sensed that when the user using the information processing device leaves the seat, the control activation means 12 by the above-mentioned control means 11 and the screen processing by the above-mentioned control means 11 are activated In the activated state, the authentication means 13 for authenticating the user who wants to use the information processing device as a user with proper authority, and the completion of the authentication by the authentication means 13 above, the control means 1 1 The means for releasing the control of the screen processing is 14, so the user does not need to perform complicated operations. When the user leaves the seat, the screen processing of the control device 11 is started to hide the content of the information. And in the state of starting the screen processing, the screen processing is released only after the authentication of the return of a user with proper authority is implemented, so that it can display information again, thereby suppressing the viewing of improper information by others, and it becomes possible. Guaranteed security device. Similarly, an information processing device capable of performing various types of information processing is configured to have: a human sensor 1 g for detecting the presence or absence of a person, and at least the function of the retention processing accepted by the retention insurance for the implementation of information processing operations When the absence of the user using the information processing device is sensed via the human sensor 1 g described above, the control activation means 1 2 of the retention processing of the above control means 11 is activated. And in the state of activation of the retention guarantee processing by the above-mentioned control means 11 in the activated state, the authentication means 13 who intends to use the information processing device is a user with proper authority, and the authentication by the above-mentioned authentication means 13 After the completion, the control release means 14 controlled by the retention guarantee of control means 13 will be released. Therefore, the user does not need to implement complicated operations. When the user leaves the seat, the control means Π will implement the retention operation of the accepted operation. In addition, the return of a user with proper authority was authenticated (-26- (23) 200416552), and the retention of acceptance operation was released, thereby inhibiting access by others to become a device that can be secured. In addition, the authentication means 13 described above implements wireless communication with a memory device M that memorizes user identification information held by the device 1 to identify the user, and wireless communication is performed by the above-mentioned prescribed records. The above-mentioned memory device M obtains the enabling information, and compares it with other information for identifying a user with proper authority. Therefore, the user does not need to implement user identification information, and it becomes a very convenient device for the user. Therefore, the information processing apparatus 1 of this embodiment is suitable for use under the conditions that a predetermined person can deal with. In particular, it can be used at any time to temporarily rent office space or in Internet cafes. < Third embodiment > In this embodiment, an information processing device 1 having an information display function and a processing function is added together to accommodate various possible storage devices 2 ', and one of the two is provided for use by the user. The storage device 2 contains all the miscellaneous devices that can store items, such as desk drawers, trucks, storage boxes, leather bags, and so on. The belongings can be stored in the storage device 2 and can be stored in the storage device 2 . And it lies in the improper information processing regulations on the setting of the storage device 2 the memory device M user identification The input operation of the user identification is not particularly suitable for business and information items. The thoughts. Of it. Use the article storage lock device 2 a -27- (24) (24) 200416552 The lock device 2 a is used for locking, and of course, the articles stored in the storage device 2 can be suppressed from being taken away. And as indicated by the patterns in Figs. 12 and 12, the locking device 2a of the storage device 2 and the information processing device 1 can be connected to the signal receiving place by wire or wirelessly. The information processing device] can lock or unlock the storage device 2's locking device 2a by sending an operation signal. The following description focuses on differences from the first embodiment. The information processing device 1 of this embodiment is, for example, as shown in FIG. 13, a processor 1 a, a main memory 1 b, an auxiliary memory device 1 c, a display 1 d, a display control device le, and an input / output interface. lh and hardware resources such as input device if, human sensor 1g, etc., plus a signal interface lj for transmitting to the storage device 2 lock device 2a. The specific aspect of the signal interface lj is a way to respond to the connection between the information processing device 1 and the lock device 2 a of the storage device 2. In detail, if the information processing device is connected by wire 1 and locking device 2a, RS-232C, USB (Universal Seriai bus) and other wired signal interfaces can be used. When the information processing device 1 and the locking device 2a are wirelessly connected, a data communication walkie-talkie such as a wireless LAN (Local Area Net Work) 'Bluetooth (brand name), or other wireless signal transmission device can be used. Similarly to the first embodiment described above, the human sensor 1g is responsible for the sensing means 10 for detecting the presence or absence of a person in a predetermined area near the information processing device 1. The program that should normally be implemented by the processor 1 a is stored in the subsidy device. -28- (25) (25) 200416552 Set 1 c. When the program is executed, the auxiliary memory device 1 c is read into the main memory 1 b and interpreted by the processor 1 a. In addition, the above hardware resources are activated in accordance with the program to make it play. As shown in FIG. 11, the control means 11 1 ′ controls the activation means 12, the authentication means 13, the control release means 14, and functions as a signal transmitting means 15. The control means 11, the control activation means 12 and the authentication means 1 3 'are the same as those in the above-mentioned first embodiment, and they can be constituted.' Therefore, their explanations are omitted in this example. The signal transmission means 15 uses the function of the signal interface lj and its device driver to send an operation signal to the lock device 2 a of the storage device 2. The signal transmission means 15 is sensed through the sensing means 10, and when the user of the information processing device 1 leaves the seat, a signal is sent (signaled) to perform the locking operation of the locking device 2a. And after the authentication by the authentication means 13 is completed, an operation signal for unlocking the locking device 2sa is issued. In other words, when the user leaves the table, in order to prevent other people from taking away the items stored in the storage device 2, the storage device 2 is locked, and then when a person with a proper limit reproduces, the authentication means 13 is used to authenticate the The user then releases the lock of the storage device 2 so that articles can be put into and taken out of the storage device 2 again. But it will not hinder the functions of the control means 11, control activation means 12, authentication means 13 and control release means 14 and signal transmission means. The functions of the various parts of the means are shared by a plurality of devices. In the case of the information processing device 1 described above. The following describes the information processing of this embodiment with reference to the flowchart in FIG. 14-29. (26) (26) 200416552 The processing procedure implemented by the device 1 ° When the human sensor 1g senses' use this When the user of the information processing device 1 leaves the seat (step s 1). The screen processing by the control means 11 is started (step s 2), and the retention processing by the control means 11 is started (step S3). Also, the lock device 2 a is issued before and after steps S 2 and S 3. In order to perform the locking operation signal of the locking device 2a of the storage device 2 (step S2 1). As a result, the storage device 2 is locked. Therefore, when the screen processing and retention processing of the control means 11 are activated, when a person is approaching the information processing device through the human sensor 1g (step S4), The person issues an instruction to urge input of user identification information for identifying a user with proper authority (step S5), and accepts input of user identification information (step S6). As described above, this embodiment is that in the above step S5, the user 1 D and 7 or the password input dialog D ° in which the user identification information is displayed on the screen of the display 1 d is accepted to use the input device. Enter the user ID and / or password of the If. After completing the input of the user identification information by the above-mentioned person (step S7), the user authentication is performed by comparing the entered user identification information with the user identification information of the user with proper authority stored in advance. . If authentication is possible and the user who wants to use the information processing device is a user with proper authority (step S8), the screen processing by the control means 11 is cancelled (step S9). And the retention processing by the control means 11 is cancelled (step S10). And before and after step S9 and step S10, the locking device 2a sends an operation signal for unlocking the locking device 2a of the storage device 2 (-30- (27) (27) 200416552 step S 2 2) As a result, the storage device 2 is unlocked. When the user with proper authority cannot be authenticated in the above step S8, the user will be urged to input the user identification information again. Press, although it is not shown in Figure 6, but when the input dialog D is displayed and waiting for the user ID and password (step S5, step S6), the timer has not been entered and the time has elapsed, or the input dialog D When the "Cancel" button configured therein is pressed, the input dialog D is cancelled and the screen protection is activated. That is, the process at the stage of step S2 and step S3 can be resumed. According to this embodiment, since the detection means 10 (human sensor I g) for detecting the presence or absence of a person is provided, the storage device 2 is provided in a storage device 2 that can store various items. The locking device 2a may send a signal for issuing an operation means 15 for performing operations for locking or unlocking, and an authentication means 1 3 for a user having legitimate authority for authenticating a user who has returned from a seat after leaving the seat. Make up. The above-mentioned signal transmitting means 14 is due to the composition. When the user's absence is sensed through the human sensor 1g, the signal is issued to perform the above-mentioned locking device 2a for locking. The operation signal is issued after the completion of the authentication by the above-mentioned authentication means 13 and the information processing device 1 for executing the operation signal for the above-mentioned locking device 2a is issued, so that the user can restrain others from leaving the seat. Unauthorized removal or reading from the storage device 1. Therefore, valuables that may be stolen, or confidential documents or other items that need to be prevented from being viewed by others, are safely stored in the storage device 2 as well. In addition, it is provided with a storage device 2 that can lock or unlock the lock device 2a that accepts the operation signal -31-(28) (28) 200416552 of the information processing device I described above, and can store various items, Therefore, the storage device 2 can be used to easily secure each item. Furthermore, in particular, in this embodiment, the information processing device 1 having an information display function and an information processing function is provided with a lock device 2 a for a storage device 2 that can store various items, and sends out a message. Signaling means for performing the operation signal of the locking device or unlocking 15. The signal transmitting means 15 is sensed through the above-mentioned sensing means 10, and when the user of the information processing device 1 leaves the seat, it is signaled to perform the locking operation of the locking device 2a. Signal. And after the authentication by the above-mentioned authentication means 13 is completed, it is signaled that it is constituted to perform the unlocking operation signal of the above-mentioned locking device 2a, so at the same time, the protection of the information stored in the information processing device 1 can be achieved at the same time And the protection of information such as paintings and paintings kept in the storage. In addition, it is a matter of course that the effects described in the first embodiment can be exhibited. The information processing device 1 and the storage device 2 of this embodiment are suitable for use in places where unspecified persons may touch. In particular, the clerk can rent office space temporarily or use it in Internet cafes. < Fourth embodiment: > Next, the fourth embodiment described is the same as the second embodiment described above. 'When the screen protection is activated on the information processing device 1' In other words, the above-mentioned screen processing and the above-mentioned retention processing In the activated state, it is considered as 1-32- (29) (29) 200416552 The method of using the information processing device 1 is a user with authority instead of the user's own user identification information input As shown in FIG. 5, the model is constituted by a predetermined memory device M held in advance by a user and wirelessly receiving user identification information. The following description focuses on differences from the second and third embodiments. In this embodiment, RFID is used as a predetermined memory device M. The RFID tag is a recording medium that reads and rewrites possible information by wireless communication instead of contact. The RFID method is not particularly limited. In order to prevent the occurrence of leftovers, it is more appropriate to use the specified memory device M as a badge, for example, or to wear it on the body. However, the specified memory device M is not limited to RFID tags, and uses portable information processing terminals with wireless communication functions, such as portable telephone terminals with radios for information communication, such as Bluetooth (brand name). It may be a predetermined memory device M. And in such a prescribed memory device M, the user identification information for identifying the user who holds it is memorized. In addition, an information processing device 1 having an information display function and an information processing function is added, and a storage device 2 capable of storing and storing various items is provided, and these are used by the user. And as shown in FIG. 5, the lockable device 2 a of the receiving device 2 and the information processing device 丨 may be connected to the signal receiving place by wire or wirelessly. The information processing device 1 sends an operation signal to the locking device 2 a of the storage device 2 and executes locking or unlocking thereof. The information processing device 1 of this embodiment is, for example, as shown in FIG. 16, a processor 1 a, a master register 1 b, an auxiliary memory device 1 c, a display 1 d, and a display -33- (30) (30) 200416552 Input devices connected to non-control device le 'and mediator input / output interface lh] f, human sensor 1 g, wireless communication device Π and other hardware resources, plus it also contains the storage device 2 The signal of the locking device 2 a to send the operation signal is connected to p 1J. The form of the signal interface lj will be a way of responding to the connection between the locking device 2a and the storage device 2 of the embedded device 1 connected to the information place. In detail, for example, when the information processing device 1 and the locking device 2 a are wired, 'RS-2 3 2 C' USB 'can be used for other wired signal interfaces 1 j, and the information processing device 1 and the locking device 2 a are wirelessly connected. , Can use the so-called wireless LAN, Bluetooth (trademark) and other data communication walkie-talkies, or other wireless signal transmission devices. (At this time, the wireless communication device 1 i and the signal connection □ lj may be the same thing.) The program usually executed by the processor 1 a is stored in the auxiliary memory device 1 c. When the program is executed (implemented), the auxiliary device 1 c reads it from the main memory 1 b and is interpreted by the processor 1 a. In addition, according to the program, the aforementioned hardware resources are activated as shown in FIG. 11 as the control means 11, the control start means 1 2 'authentication means 13, the control deactivation means 14, and the signal transmission means 1 of 5 features. Since the control means 11, control activation means 12, authentication means 13, and control release means can be configured in the same manner as those in the above-mentioned second embodiment, descriptions thereof are omitted in this example. The signal transmitting means 15 uses the function of the signal interface lj and its device driver to send an operation signal to the locking device 2a of the storage device 2. The signal transmitting means 15 is sent when the user using the information processing device 1 is detected via the sensing means 10, and the signal is sent to execute the lock device 2a-34- (31) (31) 200416552 Locking operation signal. And after the authentication by the authentication means 13 is completed, a signal is sent in order to perform the unlocking operation of the locking device 2a. In other words, when the user leaves the table, in order to prevent others from taking out the items stored in the storage device 2, the storage device 2 is locked, and when a user with proper authority appears, the user is authenticated by the authentication means 13 After that, the lock of the storage device 2 is released, so that the articles can be stored and taken out of the storage device 2 again. But it does not hinder the functions of each part of the control means 11, control activation means 12, authentication means 1 3 ′, control release means 14 and signal transmission means 15, and the functions are shared by a plurality of devices. In the case where it is established as the information processing device 1 described above. The following describes the processing procedure performed by the information processing device 1 of this embodiment with reference to the flowchart in FIG. 17. When it is detected through the sensing means 10 that the user using the information processing device 1 leaves the seat (step S 1 1). The screen processing by the control means 11 is started (step S 1 2), and the retention processing by the control means 11 is started (step S 1 3). In addition, before and after steps S 1 2 and S 1 3, a signal is sent to the locking device 2 a to perform an operation signal for locking the locking device 2 of the storage device 2 (step S 2 3). The storage device 2 is locked. Therefore, the screen processing and retention processing by the control means 11 are in the activated state, and the person who wants to use the information processing device 1 is to establish the relationship of wireless communication among the registered devices 100 million. When wireless communication is established with the specified memory device M (step S 1 4). That is, the user identification information stored in the specified memory device M is obtained (step S 1 5), and then the obtained user identification information is compared with the pre-stored information that has proper authority. The user identification information is used to implement user authentication. If it can be authenticated that the person who intends to use the information processing device 1 is a user with proper authority (step S 1 6), the screen processing by the control means 11 1 is cancelled (step S 1 7), and release the retention processing by the control means Π (step S 1 8). In step S17 and step S18, a signal is sent to the locking device 2a in order to perform the unlocking operation of the locking device 2a of the storage device 2 (step S22). As a result, the storage device 2 is unlocked. When a user with proper authority cannot be authenticated in the above-mentioned step S 1 ', the screen processing is not performed, and the solution of the control processing is credited, and the screen saver is restored. That is to return to the above-mentioned steps S 1 2 and S 1 3. According to this embodiment, since it has a human sensor 1 g for detecting the presence or absence of a person 10, and a lock device 2 a for the storage device 2 installed on the storage device 2 It can be composed of signalling means 15 for performing locking or unlocking operation signals, and authentication means 13 for authenticating users with legitimate authority to authenticate users who return after leaving the seat, and the above The signal transmitting means 15 is a signal through the human sensor lg to detect when the user is away from the seat to perform the operation of locking the locking device 2a, and is authenticated by the authentication means 13 above. After the completion, the information processing device 1 ° for implementing the operation signal when unlocking the locking device 2a described above can be used to suppress the situation where users leave the table and others are unjustly taken out or viewed from the storage device 2, so It is also possible to store the valuables that are likely to be stolen or confidential documents or articles to be prevented from being viewed by others safely stored in the storage device 2. -36 · (33) (33) 200416552 In addition, it is provided with a storage device 2 that locks or unlocks the locking device 2a that accepts the operation signal from the information processing device 1. Therefore, this storage device is used 2Easy to keep various items. Furthermore, especially in this embodiment, since the information processing device 1 having the information display function and the information processing function is also provided with the lock device 2 a which can be installed on the storage device 2 which can store various articles, In order to implement the signal transmission means 15 for operating signals for locking or unlocking, the signal transmission means 15 is sensed through the above-mentioned sensing means 10, and the use of the information processing device 1 is used. When the person leaves the seat, he sends a message to execute the operation signal of the locking device 2a, and after the authentication by the authentication means 13 is completed, he sends a message to execute the operation signal of the unlocking device 2a. It is possible to protect the digital information stored in the information processing device 1 and the protector of the information such as the documents stored in the storage device. Of course, the effects described in the second embodiment described above can also be achieved. In addition, the information processing device 1 and the storage device 2 of this embodiment are suitable for use in locations that can be involved by the hands of unspecified persons. In particular, temporary (public) office rooms, Internet cafes, etc., where salespersons can enter, can also be used appropriately. < Fifth Embodiment > The information processing device 3 according to this embodiment is a constituent who maintains the overall security of the working space used by the user as an idea. The following description will focus on differences from the first to fourth embodiments -37- (34) (34) 200416552. The information processing device 3 of this embodiment is a system mainly composed of a control device 4 and at least one storage device monitoring device 5 as shown in Figs. The control device 4 is installed in a work space such as a table, a chair, or other devices, or a computer 6 having an information display function and an information processing function. The storage device monitoring device 5 is a storage device 2 which is arbitrarily set on a desk drawer, cabinet, truck, storage box, user's bag, etc. by the user's will. The storage device monitoring device 5 is free to attach and detach the storage device 2 should. The storage device monitoring device 5 is, for example, as shown in FIG. 24, and includes a sensing unit 51 for sensing any person's operation of the storage device 2, and the sensing unit 51 for detecting any operation by any person. In the sending part 52 of the sending (sending), and the operating signal receiving part 53 for receiving the operation signal for canceling the sending function of the sending part 52 described above. Since the storage device monitoring device 5 of the present embodiment is arranged and used in the storage device 2, a light sensor 5a for detecting light waves incident from the outside of the storage device 2 is mounted on the sensing portion 51. In other words, the 'sensing part 51' senses the light wave incident on the storage device 2 when anyone opens the storage device 2 ', thereby detecting that the storage device 2 is opened. However, the sensor element mounted on the sensor 51 is not limited to the light sensor 5a. So, for example, 'a vibration sensor for detecting vibration generated by the operation of anyone. Tilt sensor for detecting tilt, or pressure sensor for drawers or doors that are used to close the storage space of the storage device 2 (when drawers, or doors are opened or closed, 'drawer-38- (35) 200416552 Changes in pressure on OR gates). Distance sensor (for detecting the distance between the open state and the closed state of storage 2. For example, it is installed in a drawer facing upward, and when the drawer is pulled out, there is no object between the sensor and the top plate), other May be used. The sending department 5 2 is a signal that anyone has notified the operation of the storage device 2 or an alarm that threatens a person who operates the storage device 2. The reporting unit 52 of this embodiment is actually equipped with a device for reporting, such as a light-emitting device 5b that emits light and / or a sound output device 5c that outputs a sound and controls the above-mentioned devices 5b, 5c. Control circuit 5d. These are usually driven by a battery, but when the detection of the sensing unit 51 of the transmission system is performed on the storage device 2, more specifically, the detection of the sensor 5a of the sensing portion 51 is performed by the storage device. When there is an incident light wave outside 2, the sensing part 5 1 — once the operation on the storage device 2 is sensed and continues to report, or only the light sensor 5 a of the sensing part 5 2 It is also possible to send a report between the detected light waves. Or it may be okay to start the report at a certain time. When a solar cell is used as the sensing unit 51, the transmission can be performed by using the incident light wave as the energy when the housing 2 is opened. The operation signal receiving section (receiving section) 5 accepts signals by wire or wireless. The operation signal is sent from the control device 4. In this embodiment, the wireless interphone 5e having the function of receiving the operation signal wirelessly transmitted by the control device 4 serves as the operation signal receiving section 53. The radio 5e is connected to the control circuit 5d of the transmitting section 52. In addition, the reporting department has a specific example to detect the 0 o'clock detection, and it can control the 5 2 -39- (36) (36) 200416552 control circuit 5 d. The operation signal receiving section 5 3 accepts the release request. The security signal does not perform a report operation when operating the signal. However, only when the operation signal for the purpose of releasing the security function is not accepted, it is constituted so that a person will perform a report operation when the storage unit 2 is operated via the above-mentioned sensing unit 51. In other words, in order to release the operation signal, the control device 4 sends a signal, and the operation signal receiving section 53 is receiving, although the sensing section 51 detects that someone has operated the storage device 2 Reporting by the Reporting Department 52 will not be implemented. However, it does not interfere with the operation of the signal receiving department 5 3 series, wired communication interface. The storage monitoring device 5 and the control device 4 are connected in a wired manner. Fig. 30 shows a circuit diagram of the principle of the circuit for supplying power B to the load monitoring device 5 for the load Z, that is, the control circuit 5d, the light-emitting device 5b, the sound output device 5c, and the wireless intercom 5e. There is a semiconductor switch (such as an electric field effect transistor, a bipolar transistor, a thyristor, etc.) on the circuit for 5 hours. The ON / OFF of the semiconductor switch 5h can control the power supply to the load Z. The example in the figure is based on the n-channel MOSFET 5h as the switch. The unreceived light sensor 5a functions as a large resistance. When the light sensor 5a is not receiving light, the drain-source of the MOSFET 5h of the semiconductor switch is cut off, and the voltage applied to the load Z becomes zero. In addition, when the photo sensor 5 a receives light, a current flows from the photo sensor 5 a through the gate-source voltage of the MOSFET 5 h, and the drain-source becomes conductive. As a result, a voltage is applied to the load Z. As described above, the storage device monitoring device 5 of this embodiment is used to supply power to the transmitting section 52 and the operation signal receiving section -40- (37) (37) 200416552 5 3 when the light sensor 5 detects a light wave. It can save electricity and extend battery life. To sum up, the storage device monitoring device 5 having a sensing section 51, a transmitting section 52, and an operation signal receiving section 53 is used as the control means shown in Fig. 18! ] And execute the security function for the operation of the storage device 2 (that is, the detection and reporting of improper operation) to suppress the operation of the storage device 2 other than the user with proper authority c. On the other hand, the control device 4 is shown in FIG. A sensor 4a for detecting the presence of a user, the presence of others, a wireless walkie-talkie 4b that implements wireless communication with the storage device monitoring device 5, and a display device 4c that displays any mark for the user, etc. (Such as LED light-emitting device or display), input device 4d (typically keyboard input device) that accepts input by the user, and hardware resources such as communication interface 4e for wired or wireless connection with computer 6 are provided by Controlled by the control circuit 4f. However, a processor (not shown) capable of interpreting and storing the program stored in the memory 4g and operating the hardware resources described above may be installed. Normally, the controller device 4 is operated by receiving external power supply. However, when the communication interface is USB, IEEE 1394, etc., it is also possible for the computer to receive power supply through the communication interface 4e. It is also possible to connect the controller device 4 and the computer 6 by electric light (or power line) communication. In detail, the control device 4 and the computer 6 are provided with a power line MODEM as the communication interfaces 4e and 6g. If the power line MODEM is connected to the electric light line, the electric power is received by the electric light line on one side and the same electric light line The control device 4 and the computer 6 are mutually possible. Therefore, the control device 4 uses the above-mentioned hardware resources by the control circuit 4f to exert the sensing means 10, the authentication means 13 shown in Fig. 18, and the control solution -41-(38) (38) 200416552 except Means 4 functions. The sensing means 4 detects whether or not a person exists in the work space in which the control device 4 is installed. It is possible to sense the presence or absence of the user through the sensing means 10. In this embodiment, the same human sensor 4a as the first embodiment is used as the sensing means 10. As in the first embodiment, the supplementary explanation in the first embodiment is that the human sensor 4a may be used in combination with a distance sensor or the like. Furthermore, if the communication between the control device 4 and the computer 6 may be connected, the computer 6 may be configured to send information related to the output of the sensing means 10 one by one. The authentication means 1 and 3 are the cases where the user who returns after the user leaves the seat has the right user. In detail, when the human sensor 4a is used as the sensing means 10, since the human sensor 4a itself does not judge that the person appearing in the workspace is a user or a person other than the user, the The authentication means 1 3 performs user authentication. Authentication of a user is performed, for example, for a person returning to a work space, requesting input of user identification information for identifying a user having a proper user. The user identification information of a user with proper authority is memorized in advance by ordinary text or password. The control device 4 or a memory device such as a memory body 4g installed in the control circuit 4f, or a predetermined recording area of the main memory 6b or the auxiliary memory device 6c of the computer 6 which may be connected to the control device 4 by communication. When performing authentication, it is compared with the user identification information inputted through the input device 4d. This embodiment adopts a method of inputting a "password" through the input device 4d as user identification information. -42-(39) (39) 200416552 However, the user identification information is not limited to passwords. Therefore, it is also possible to use biometric information as user identification information for authentication based on the physical characteristics of the user. At this time, a device for inputting biological form information is set in the control device 4 in advance. The authentication means 1 to 3 may be implemented by plural means. In addition, the authentication means 13 is to sense the approach of a person through the human sensor 4a, and to instruct the person to input the user identification information for identifying the user, and may accept the input person. Better. The instructions for urging the user to identify the information are issued in the form of screen display, sound output, or other various use interfaces. In this embodiment, the display device 4c is used to urge the user to input the input symbol (signal) of the user's identification information (such as the LED's light, light, etc.), and accept the input at the same time. The way. Another example is that the control device 4 is actually provided with a sound take-out device (not shown) and outputs a sound that urges the input of user identification information. The control release means 14 is based on the detection of the above-mentioned sensing means 10, and the condition of the user's absence will be based on the completion of the authentication of the authentication means 13 and then the provisions of the implementation of the control means 11 will be released. Security function. As described above, in this embodiment, the storage device monitoring device 5 provided in the storage device 2 will become the control means for performing the security function of opening and closing of the storage device 2 by 11 °. Therefore, the release of the storage device monitoring device 5 When performing the security function, it is necessary to input an operation signal indicating the intention to be released into the storage device -43- (40) (40) 200416552 monitoring device 5. The means for releasing the control 14 is to use the function of the radio 2b. On the other hand, when the user authentication processing by the authentication means 13 is successful, an operation signal for pre-release security function is sent to the storage device monitoring device 5. The following describes the basic processing procedures (sequences) executed by the control device 4 and the storage device monitoring device 5 of this system with reference to the flowcharts in FIGS. 26 and 27. As shown in FIG. The sensor 4a detects that the user is present at the control device 4 through the human sensor 4a, and the control device 4 continues to send a signal to the storage device monitoring device 5 as an operation signal for releasing the security function (step S2 5 ) ° Further, when the user detects that the user is away from the seat through the human-sensing sensor 4a (step S26), the transmission of the operation signal for releasing the security function is stopped (step S27). As a result, the security function of the storage device monitoring device 5 is activated. The control device is after the user leaves the seat, in other words, when the security function of the storage device monitoring device 5 is activated, when a person approaches the information processing device 3 via the human sensor 4a (step S28) ), An instruction is issued to the person to urge the user identification information for identifying a user with proper authority (step S 2 9), and the input of the user identification information is accepted (step S 3 0). As mentioned above, in this embodiment, the above step S 3 0 is to urge the user to input user identification information through displaying 4 c output symbols (signs) appealing to the visual aspect of the person, and accept the use of the input device 4 d Password. After the input of the user identification information of the person is completed (steps 44- (41) (41) 200416552 S 3 1). The user identification information inputted is compared with the user identification information about a user with proper authority stored in the control device 4 (or computer 6) in advance, and user authentication is performed. If it can be verified that the person appearing in the work space is a user with proper authority (step S32), the security function of the storage device monitoring device 5 is released. In other words, an operation signal is issued to release the security function (step S 3 3). When the above step S 3 2 fails to authenticate (confirm) a user with proper authority, the user is again urged to enter user identification information. Although the storage device monitoring device 5 is used to perform a security function related to the opening and closing of the storage device 2, the execution is limited to a period in which the operation signal from the control device 4 that does not intend to release the security function is received. As shown in FIG. 27, the sensor 51 of the storage device monitoring device 5 senses the operation on the storage device 2, and the operation signal receiving portion 53 fails to accept (receive) the data from the control device 4. When operating a signal (step S 3 4 and step S 3 5) ′ The transmitting section 5 2 will transmit a report (step S 3 6). On the other hand, although the sensing unit 5 1 senses the operation on the storage device 2 (note: someone opens the storage device, etc.) ', the operation signal receiving unit 53 does not perform a report operation when it can still accept the operation signal. In other words, the storage device monitoring device 5 is based on the detection of the human sensor 4 a provided by the sensing means 10 of the control device 4 and the user has left the seat as a condition, and the opening and closing of the storage device 2 is started. At the same time, the execution of the security function is cancelled by the cancellation means 14 provided in the control device 4. The following describes the computer 6 that can be communicatively connected to the control device 4. • 45- (42) (42) 200416552 This computer 6 is a stored personal computer, workstation, Pda, etc., and can be used to send information 'in words and pictures. , Images, or a combination of these are displayed on the screen 'and can be constructed (implemented) in various ways by information processors. The computer 6 is an essential element in this system, but it is possible to perform the processing described below in conjunction with the control device 4. The computer 6 is, for example, the hardware resources of the processor 6a, the main memory 6b ', the auxiliary memory device 6c, the display 6d, the display control device 6e, the input device 6f, and the like, as shown in FIG. Connect the communication interface 6g of the control device 4 by wire or wireless. The specific aspect of the communication interface 6g will be the one responding to the connection between the control device 4 and the computer 6. In detail, when the control device 4 and the computer 6 are connected by a wire, R S-2 3 2 C, U S B, IE E E 1394, and other wired signal interfaces can be used. When the control device 4 and the computer 6 are wirelessly connected, a so-called wireless LAN, Bluetooth (trademark) or other data communication walkie-talkie, or other wireless signal transmission device may be used. Generally, the program executed (implemented) by the processor 6a is stored in the auxiliary memory device 6c, and when the program is to be executed, the auxiliary memory device 6c is read into the main memory 6b. It is interpreted by the processor 6a, and the above-mentioned hardware resources are activated by the program, so that it can use the control means 11, control start means 12 and control release means 14 shown in Fig. 10 Features. The control means 11 is provided with a function of screen processing for concealing (hiding) the information displayed on the screen, and a function of retention processing for receiving information for the purpose of performing information processing operations for retention. The control means 1 1 is, for example, -46- (43) 200416552. Using a conventional screen saver module program can constitute a protector module program and can be hidden (hidden). Acceptance of the current maintenance operation is now maintained. It is also a strategy to turn off the power of the display 6d according to the screen of the control means Π, in other words, to display it. Control start means 1 2 series, when the control device < When a user using the computer 6 leaves, Start screen processing and retention processing by full-featured words. When the control device 4 (the control circuit 4f or the processor) detects the user's absence from the detector 4a, The information is communicated to the computer 6 through the notification. When receiving this information through the communication interface 6g, It is activated by the control means 1 1. The control starter is composed of the main body. Means of release 14 When there is a legitimate return to the workspace, The release is controlled by the control means 1 1. The control device 4 (controller) of this embodiment is after the person in the user seat is authenticated by the authentication means 13 to be a user with proper authority. The message of this purpose is transmitted to the computer6. When communicating through communication, The means of release is to release the screen saver function. So I returned to the screen showing the information, The restarting means 14 is also constituted mainly by a program. However, the computer 6 is set to implement user recognition. By launching the screen display, And one of the processing states is that the indicator 6 d is turned off 1 to sense the presence of the profit control means Π to ensure this embodiment, Through the human-sensing sensor interface 4c, the table control and starting means 12 and 12 are processed by the screen of a user who uses the program as the authority. After leaving the reserved circuit 4f or processing, Return to the communication interface 4e and port 6g to accept the screen saver of the information program and accept the operation. The certification method of the control card is 1 3 -47- (44) (44) 200416552. At this time, the authentication methods are 1 to 3, It is used when the retention guarantee is activated by the screen processing and operation of the control means 1 1 described above, Revert to the situation where the person in the workspace is a user with proper authority. And this certification is, For example, for people who appear in the workspace, Asking it for input, The user identification information used to identify users with proper authority is implemented. User identification information about users with proper authority is stored in advance (plaintext or encrypted), The specified memory area of the main memory 6b or the auxiliary memory device 6c, Or a specified memory area of a main memory or a supplementary memory device of a prescribed information processing terminal (not shown) which can be communicatively connected with the computer 6. When performing authentication, It is compared with the user identification information input via the input device 6f. Furthermore, If the information about the output of the sensing means 10 installed in the control device 4 is taken from the configuration of the control device 4, At startup yes, In the state of screen processing and retention processing by the above control means 11, When a person is approached via the above-mentioned sensing means 10, Instructions can be given to that person to urge the user to enter information. The instructions for urging the input of user-identifying information are, Display on screen, Sound output, Can be issued through other user interface aspects. For example, one side is on the display 6d, Display a dialog asking for input from the user, It can also accept its input. The control device 4 and the computer 6 are provided with authentication means 1 3, When each user authentication can be implemented, The release of the security function of the storage device 2 is performed by using the authentication means 13 on the control device 4 side. About the security functions of the computer 6 (screen processing, The cancellation of the retention guarantee process can be implemented by means of computer 6 authentication -48- (45) (45) 200416552 Means 13. Or when using any authentication method, It is also possible to cancel the security function of both parties. The control device 4 and the computer 6 can be connected via a communication interface 4e, 6g, Communicate information about the success or failure of user authentication. also, When the authentication means 13 are provided on the computer 6 side, The authentication means 1 3 does not necessarily need to be provided on the control device 4 side (and the input means 4d does not need to be provided on the control means 4). In order to release the security function of the storage device monitoring device 5 at this time, A computer 6 is required to perform user authentication also. When the user authentication succeeds with the authentication method 1 3 on the computer 6 side, For the information on the 4th side of the control device, it indicates the intention, The control device (the control circuit 4f or the processor) that receives the information sends an operation signal to the storage device monitoring device 5 for release. In other words, Coordinated by the control device 4 and the computer 6, It is established as the "information processing device" described in item 1 of the scope of patent application or the "control device" described in item 11 of the scope of patent application. Based on Figure 2 3, Fig. 31 and Fig. 32 show usage forms of the storage device monitoring device and control device 4 according to this embodiment. Figure 23 is assembled, Storage device monitoring device 5, The basic form used by the control device 4 and the computer 6. If the storage device 2 is operated without being authenticated by a user with proper authority, a report will be issued (alarm or warning), and access to the computer 6 by a user with proper authority will be impossible. In other words protect at the same time, Security of storage device 2 and security of computer 6. FIG. 31 shows a form other than the storage device monitoring device 5, This form only protects the security of computer 6. If the storage device 2 does not store valuables or secrets -49 · (46) (46) 200416552 or other documents or the storage device 2 does not exist, It is sufficient to use the form in Figure 3. Figures 3 and 2 show a form using only the storage device monitoring device 5. In this way, it does not matter whether the user has proper authority, As long as the storage device 2 is operated, a report will be sent. In this way, the storage device 2 can be easily protected by using only the storage device monitoring device 5. The supplementary description of the storage device monitoring device 5 will be described below. Sometimes, a plurality of storage device monitoring devices 5 exist in a predetermined work space. When the plurality of storage device monitoring devices 5 are used by a specific user or user group, The wireless transmission path between each storage device monitoring device 5 and the control device 4 is not necessarily different. In particular, when the security functions of all the storage device monitoring devices 5 are all released in unison, That is, the operation signals transmitted from the self-controlling device 4 to the storage device monitoring devices 5 can be made common. However, as long as the security requirements of a part of the storage device monitoring device 5 are released, It is necessary to assign a channel (individual) to the communication between each of the storage device monitoring devices 5 and the control device 4. There is a plurality of control devices 4 in a predetermined working space. The same applies to the presence of the storage device monitoring device 5 corresponding to each control device 4. Although the multiplexing method used by the wireless walkie-talkie installed in the storage device monitoring device 5 and the control device 4 is not particularly limited, However, it is necessary to attach an identifier to the wireless transmission path (for the purpose of assigning the respective channels) between each of the storage device monitoring devices 5 and the control device 4. The above identification subsystems are stored in the control device 4 and the storage device monitoring device 5, respectively. For example, operate the D I P (Dual In-Line) switch mounted on the storage device monitoring device 5, And the decision should be attached to this container supervision • 50- (47) (47) 200416552 The identifier of the protective device 5 (especially the number of digits), The same identifier is input to the control device 4 via the input device 4 d and stored in the memory 4 g installed in the control device 4. Specific examples will be described below. The storage device monitoring device 5 of this example is as shown in FIG. Covered with cover 9 The installed light sensor 5 a, Control circuit 5 d, Luminescent device 5 b, Sound output device 5 c, It is constituted by a circuit board 5i of hardware resources such as a radio intercom 5e. The DIP switch 7 is also mounted on the circuit substrate 5 i. Light sensor 5 a, The light-emitting device 5 b exposes at least a part of it to the outside. D I P switch 7 is connected to the control circuit 5 d, Or wireless intercom 5e, The parameters set by the DIP switch 7 refer to these circuits 5 d or the wireless intercom 5 e. For example, the operation signal accepted by the wireless interphone 5e sent by the control device 4 includes an identifier for identifying a wireless transmission path (this is used for identification, When the receiving address of the operating signal is used to identify the identifier of the storage device monitoring device 5), The control circuit 5 d or wireless intercom 5 e is a comparison between the identifier included in the operation signal and the parameter set by the D IP switch 7. It is judged that the operation signal is accepted or ignored. In other words, The D I P switch 7 is also used to set an identifier for the control device 4 and the storage device monitoring device 5 to correspond to each other. On the storage device monitoring device 5-5, An opening 9 1 is formed through which the setting key 8 can be inserted. The key 8 is used to assign one or more storage device monitoring devices 5 to a certain identifier. In detail ', the user sets a predetermined parameter to the DIP switch 7 mounted on the storage device monitoring device 5. Insert the setting key 8 ′ from the opening 91 and engage the tip end with the operation part 7 of the D p switch 7 j -51-(48) (48) 200416552, As a result, the parameters specified by the setting key 8 can be set to the DIP switch 7. The DIP switch 7 (dual in-line switch 7), which is an example of a detailed diagram, is provided with a plurality of sliding operation parts 71. D 1 P switch 7 (Sliding DIP switch 7). As shown in Figure 33, As shown in Figure 34, The slide DIP switch 7 is provided adjacent to an opening 91 formed in the cover 9. The operation portions 71 are arranged so as to be variable in orientation along the insertion direction of the setting key 8 inserted through the opening 91. The arranged operation sections 7 1 can be positioned at one of the positions near the opening 9 1 side or farther from the opening 91 side. Each operation section 71 can set one of the two of HI / LO, Taking DIP switch 7 as a whole, A parameter equivalent to the number of bits of the number of the operation sections 71 can be set. And all the operating sections 7 1 are, In the initial state (for example, at the time of shipment), it is positioned near the opening 91 side in advance. And after being engaged with the setting key 8 inserted through the opening 91, the position is shifted away from the opening 91. Set key 8 series, For example, a thin plate-like body made of resin. An engaging edge 81 and a back wall groove 82 are formed at the front end portion. The engaging edge 8 1 is engaged with the operation portion 7 1 when the setting key 8 is inserted through the opening 9 1. Those who have caused it to shift to a prescribed position. Among the plurality of operation portions 71 included in the DIP switch 7, a portion of the operation portion 71 to be operated is provided. The avoidance groove 82 is when the setting key 8 is inserted. Avoid interference from the operation section 71, And the operation part 71 will not be displaced. It is provided at a position corresponding to the operation portion 71 which is not a target of operation among the plurality of operation portions 71. -52- (49) (49) 200416552 Dimensions of the depth direction of the avoidance groove 82 (the direction parallel to the insertion direction of the setting key 8), It is equal to or larger than the row of the operation part 71 of the switch. The example of the figure illustrates a bottomed groove that does not penetrate the surface and back of the setting key 8. However, the structure of the watch and the back of the setting key 8 can be worn through. When the storage device monitoring device 5 is started to be used, a user who wants to set a parameter with the D I P switch is "holding the base end of the setting key 8" and inserts it into the cover 9 through the opening 9 1. Therefore, the engaging edge 8 1 provided at the front end portion is in contact with one or a plurality of operation portions 7 1. Then, it is pushed into the esoteric part ', and the operation part 71 engaged with the engaging edge 81 is changed to the direction away from the opening 91 by the operation force. on the other hand, The position of the operation portion 71 entering the avoidance groove 82 remains unchanged. This state is shown in Figs. 35 to 37. Then pull out the setting key 8 from the opening 91, And the parameter setting operation is completed. If the same parameters are to be set for the plurality of storage device monitoring devices 5, It is needless to say that the operations described above can be performed for each of the storage device monitoring devices 5. press, Figure example system, A guide member 92 is provided between the periphery of the opening 91 formed in the cover 9 and the DIP switch 7. On the guide member 92, A pair of ridges 93 protrude from the surface. The separation distance of the pair of convex strips 93 is slightly equal to the size of the width direction of the setting key 8 (the direction perpendicular to the insertion direction). Then, the two sides of the setting key 8 are slid to each convex strip 93 (plus, The surface of the setting key 8 slides against the surface of the guide member 92), As a result, the front end of the setting key 8 is directed toward the operation portion 71 of the DIP switch 7 so that the user can appropriately enter. Furthermore, in order to prevent the excessive entry of the setting key 8 inserted through the opening 91, even the operation portion 71 entering the avoidance groove 82 is operated. -53- (50) (50) 200416552, It is also appropriate to provide a stopper portion 94 which is located at a certain position and inhibits the entry of the setting key 8 or more therefrom. For the DIP switch 7 that has been set with parameters, if you want to set other parameters, Or To return the D I P switch 7 to its initial state, Or when the setting key 8 is lost, etc., you can open cover 9 or remove cover 9, It is sufficient to directly operate the operation section 71. Furthermore, Lies on the control device 4, Set the same DIP switch (not shown) as the monitoring device 5 on the storage device. Openings (not shown) are also available. In this way, The setting key 8 applicable to the storage device monitoring device 5 can also be applied to the control device, Therefore, the same parameters are set for both, In other words, An identifier can be set which can correspond to both. Since it is constituted as a switch setting mechanism as described above, Have: There are a plurality of operating sections 71, And each operation part 71 is a mechanical switch 7 which is individually operated, And a cover 9 ′ for shielding the switch 7 from the outside and an opening 91 formed in the cover 9, And the switch setting mechanism constituted by inserting the above-mentioned opening 91 and engaging the front end portion with the setting key 8 of the operating portion 7 1 of the above-mentioned switch 7 is characterized by, It is located at a position corresponding to the operation portion 71 to be operated at the front end of the setting key 8, An engagement edge 8 1 ′ that is engaged with the above-mentioned operation portion 71 and can be displaced to a predetermined position is provided at a position corresponding to the operation portion 71 that should not be operated. An avoidance groove 83 is provided to avoid interference by the operation portion 71, And by inserting the setting key 8 through the opening 91 of the user, a plurality of operation positions 71 (positions) can be set one by one. Therefore, the setting parameter setting operation for the switch 7 can be easily performed. Compared with each operation part 7 of the switch 7, the burden can be reduced. This event indicates that the same identifier is set for each of the plurality of setting target devices (storage device -54- (51) (51) 200416552 monitoring device 5 and / or control device 4), It is effective to set a plurality of DIP switches 7 in the same state. In other words, the same setting key 8 can be used to quickly set the plural switches 7 to the same state. Plus, The cover 7 is used to protect the switch 7 ', so that the operation portion 71 of the switch 7 is prevented from being operated by mistake. Furthermore, The examples shown in Figure 33 and Figure 37 are A DIP switch 7 having a plurality of operating portions 71 is equivalent to the "mechanical switch j °" in the present case, but a plurality of switching devices are combined (having at least one operating portion each) to constitute the "mechanical switch" It ’s okay. Also, the switch is not limited to the slide switch of the sliding part of the operation part 71. Therefore, for example, a lever switch for swinging the operation part or a torsion switch or a pressing switch for the operation part that may be absent may be used. Furthermore, The D I P switch 7 in the example shown in the figure is located on each side of the opening 9 1, One of the two positions on the side of the opening 9 1 ′ Therefore, the operation part 7 1 displaced by being pushed by the engaging edge 8 1 of the setting key 8 is always moved to a position on the side of the opening 9 1. Therefore, the engaging edges 8 1 set on the setting key 8 and corresponding to the respective operating portions 7 1 to be operated are aligned in a row in the width direction of the setting key 8. but, It is necessary to set the operation section 71 to a switch with three or more positions (in other words, The range of 値 set by each operation section 71 is three or more). At this time, as shown in FIG. 38, 'the engagement edge 8 1 set on the setting key 8 is in response to the setting position corresponding to each operation section 71 (the parameter set by each operation section 71)' It is also possible to be located at different positions along the insertion direction of the setting key 8. -55- (52) (52) 200416552 This makes it possible to multiply the transmission path between each storage device monitoring device 5 and control device 4. In particular, the granting and receiving of the operation signals between the plural control devices 4 and the storage device monitoring devices corresponding to the control devices 4 can be appropriately performed without interference (mixing). , In a state where a plurality of users use the storage device monitoring device 5 in a working space, When a user performs user authentication via the control device 4 used by the user, The operation signal is transmitted only to the storage device monitoring device used by the user. And release its security function. The storage device monitoring device 5 used by other users still maintains its security function. As mentioned above, In a workspace shared by multiple users, Individual users can guarantee their security functions. Furthermore, the control device 4 can memorize the identifiers given to the storage device monitoring devices 5 and the user identification information in association with each other. Therefore, the control device 4 is that after the user authentication by the authentication means 13 is performed, The security of the storage device monitoring device 5 of the authenticated user is selectively released. The storage device monitoring device 5 is shaped to imitate the appearance of other articles, Or the functional terrain with other items becomes appropriate. In particular, it is in the form of an article which is stored in the storage device 2 without feeling unnatural, For example, it is formed in the form of a stationery or an article used together with the storage device 2, Or it is better to add the function of the control means 11 to these items. To illustrate, I.e. imitated as a folder for storing documents, box, Writing utensils, Other stationery, Forming the external appearance of a partition plate or the like that partitions the storage space of the storage device 2, Or they can be mounted on these items as the sensing part 51, Reporting Department 5 2 -56- (53) (53) 200416552, Each of the elements of the signal receiving section 53 is operated to constitute the storage device monitoring device 5. So it can be played, For example, it is not easy for users who perform improper behavior to find the effect of camouflage of the storage device monitoring device 5 provided in the storage device 2, Or usually the user can use the storage device monitoring device 5 as a folder, box, And other items, etc. The effect on the practical side. The example shown in Figure 33 is, For example, the shape of the storage device monitoring device 5 is shaped like a file folder with a resin cover 9. The security function performed by the storage device monitoring device 5 responsible for the control device 11 is only released during the acceptance period of receiving the operation signal for the release from the control device 4, In other words, Between user seats, The control device 4 can continue to send operation signals for release. The only other aspect can be constituted as: When the control device 4 senses, When a user leaves, The operation signal for activating the security function of the storage device monitoring device 5, And when the return of a user with improper authority is authenticated, an operation signal for releasing the security function of the storage device monitoring device 5 may also be issued. 〇 At this time, the storage device monitoring device 5 is, It is possible to start the security when receiving the operation signal for activation. In a state where security functions are performed, When accepting an operation signal for release, Stop the security function. Information regarding the state where the security function is performed (state where the user is absent) 'or the state where the security function should be stopped (state where the user is present) is maintained in the storage monitoring device 5 (not shown in the figure) Show the memory). In other words, when the operation signal receiving section 53 receives one of the operation signals, In response to the content of the operation signal, the state maintained is switched. -57- (54) 200416552 The control circuit of the transmission unit 5 2 is operated by the sensing unit 5 I and 2. With reference to the above memory, When the status of the current security function, Perform a report action. It is also possible that the transmission unit is not provided on the side of the storage device monitoring device 5 and the device 4 side. The reporting means 1 installed in the control device 4 is detected until the user leaves the seat until the user who has the right to authenticate the hand is authenticated and is placed in the storage device. The monitoring device 5 is connected to the sensing unit 51. When operating the tool 2, Using the power of the walkie-talkie 5 e Information on this purpose. The reporting department of the control device 4, When the information sent by the monitoring device 5 To glow, Reporting is performed acoustically. at this time, The storage device monitoring device is set up to perform a security function in cooperation with the storage device belonging to the control means 11 according to the above when the operation of the storage device 2 by a person is sensed, At the same time, it is determined that the report is made by users other than users with proper authority. Unlike this approach, Providing a direct one on 叱 can suppress the opening and closing of the storage device 2. E.g, Controlled by the control circuit 5 d, The lock-up device of the physical restraint storage device 2 in 叱 is the lock-up device referred to in this case: For example, in such a manner that the opening and closing of the storage device 2 becomes difficult, With the appearance of the locking bolt member used for 2 and so on. At this time, through the operation signal receiving unit 5 3, it is accepted that the state of storage should be fulfilled in order to release the protection. And set in the control department, When it is authenticated by the sensing section, it has the reportable status. And measured, There is an output form for the radio signal indicating that the audio output from the storage device has been accepted, The other 5 and the control device 4 are the control means 1 1. 5 护 装置 5。 When the user who performed the operation system, The mechanism for the monitoring device 5 can also test that the monitoring device 5 L ° balloon expands, Or drive control circuit 5 d is a full-featured operation signal -58- (55) (55) 200416552, In other words, When operating signals for unlocking, The locking mechanism shrinks the balloon inside, Alternatively, the lock bolt member is driven to allow the container 2 to be opened and closed. Instead, When you cannot accept the operation signal for the purpose of releasing the security function, The control circuit 5 d inflates the balloon of the lock mechanism or drives the lock bolt member to lock the storage device 2. In other words, As the storage means of the control means 11 and the report of the monitoring device 5 instead, the security function of "locking" is performed. In the above situation, It is not necessary to actually install the sensing unit 51 for sensing the operation of the storage device 2. But using: Is not an operation signal that is intended to release the security function, When the operation signal (sent from the control device 4) is intended to activate the security function, Balloon (inflating) implementing a locking mechanism, Alternatively, the locking bolt member may be driven to perform the locking. at this time, The wireless walkie-talkie 4b of the control device 4 is used as the "signal transmitting means" described in the patent application scope item 6 or item 7. The storage device monitoring device 5 is equivalent to a "locking device". By the way, As a means of displaying the security function, it is also possible to install a power-on device that applies a voltage to the contact portion of a person who wants to operate the storage device 2 without applying a lock mechanism to prohibit the operation of the person (such as an electric fence). In this way, the opening and closing of the storage device 2 can also be suppressed. Instead of the storage device monitoring device 5, In addition, as described in the third to fourth embodiments, A system controlled by the control device 4 of the storage device 2 incorporating the locking device may be incorporated. At this time, the wireless walkie-talkie of the control device 4 will be responsible for transmitting the operation signal to the locking device 2a of the storage device 2 • 59- (56) (56) 200416552 Signaling means 15. And when the user ’s departure is detected via the sensing means 10, Send a signal to perform the locking operation of the locking device 2 a, And after the certification by certification means 13 is completed, The signal is an operation signal for unlocking the locking device 2 a. In other words, "when the user leaves the seat", the storage device 2 is locked in order to prevent others from taking out the items stored in the storage device 2, When a user with proper permissions appears, After the user is authenticated by the authentication means 1 3 ’, the lock of the storage device 2 is unlocked, In this embodiment, the articles can be put in and out of the storage device 2 again. In this embodiment, the storage device monitoring device with a lock function 5 is, Can be regarded as, Apply for lock-up as described in item 6 or item 7 of the patent application, It is incorporated in the storage device 2. Or put it on the storage device 2 and the lock device 2 a can be regarded as, "Control means 1 1" as described in item 1 or 4 of the scope of patent application. Plus, When the storage device monitoring device 5 detects that an improper operation occurs on the storage device 2, It is advisable to constitute the system with information on the facts of improper operation. For example, if there is no operation signal for the purpose of releasing the security function, When it is detected through the sensing unit 51 that a person has operated the storage device 2, The control circuit 5d of the transmitting section 52 uses the function of the wireless interphone 5e to signal the control device 4 that "someone has performed an improper operation". 5 series of this storage device monitoring device, you could say so, When the fact that someone has done the operation on the storage device 2 without the user authentication of the authentication means 13 is sensed, Be a reporter by wireless signal. Figure 20 on the other hand shows, On the control device 4 or a computer 6 connected to the control device 4, Settings, "Illegal access to information output means" -60- (57) (57) 200416552 to generate information about improper facts 16. The so-called "output of information" in this case refers to: Contains the display of the screen of the monitor; Print out Dissemination of external information; Write to memory or hardware drive or other memory devices; Wait for it. The specific composition of the unauthorized access information output means 16 will become in response to, Those who output information about improper facts. In this embodiment form, For example, it is the person who makes the control device 4 act as the unauthorized access information output means 16. To elaborate, Accepting through wireless walkie-talkie 4b, Sent from the storage device monitoring device 5, When there is information indicating the intention of improper operation, The control circuit 4f (or processor) of the control device 4 generates information about the fact of the improper operation. Written in the memory 4g installed in the control device 4, Signals are sent towards the computer 6 via the communication interface 4e. Send the information to the specified information processing terminal (not shown) that can be connected to this computer 6 via the electrical communication circuit. (Indicate the address of the information processing terminal as the receiving address of the signal.) The data is usually stored in advance in the memory 6b of the control device 4, Or the auxiliary memory device 6c) to perform the output of the facts about the improper operation. In the information generated and output by the unauthorized access information output means 16, "for example," includes information indicating that the storage device 2 was operated improperly or the date when the operation was performed improperly Information about time. However, the unauthorized access information output means 16 may be installed on the computer 6. which is, The control circuit 4f of the control device 4 that has received the information indicating that the intention of improper operation is performed by the storage device monitoring device 5 notifies the intention to the computer 6 via the communication interface 4e. And computer 6 of the notification -61-(58) (58) 200416552 processor 6a series, Generate programmatic information about the facts of improper operation, Instead: Shown on display 6d, Written in the specified memory area of the main memory 6b or the auxiliary memory device 6c, Or send a signal to a prescribed information processing terminal that can be communicatively connected to this computer 6 through an electrical communication circuit, Wait and output. Plus, The unauthorized access information output means 16 is based on the fact that when the user authentication by the authentication means 13 fails, the information about the fact can be generated and outputted. According to this embodiment, As a result of having: Sensing means 1 for detecting the presence of a person (human sensor 4a), And based on the above-mentioned human sensor 4a, User's absence is conditional, Start to implement the required security functions, That is, the control means of screen processing and / or retention processing 及 ′ and the security function of the above control means 11 is activated, The person used to authenticate the return is the user's authentication means 13 with the proper authority, and after the authentication by the above authentication means 13 is completed, The information processing device 3 (system) configured to release the control means 14 from the security function control of the control means 11 above, Therefore, if the user does not perform complicated operations, it is still because the security function of the control means 11 is activated when the user leaves the seat. And in the activation state of the security function, After authenticating the return (return) of a user with proper authority, Just lifted, Therefore, we can prevent unauthorized access by others, Become a device that can be secured. As the storage device monitoring device 5 as the above-mentioned control means Π performs the function of guaranteeing the opening and closing of the storage device 2 ', the above-mentioned means for releasing the control 1 4 is, When the authentication by the above-mentioned authentication means 13 is completed ', for -62- (59) (59) 200416552 the above-mentioned control means I 1, Send the operation signal about the release of the security function, So between users leaving the table, Can restrain others from taking out the contents of the storage device 2 improperly, Or browse, So you can safely steal valuables or confidential documents that you do n’t like others to read, It is also stored in the storage device 2. As the control means 1 1 (storage device monitoring device 5) is freely attachable to the receiving device 2, Therefore, the user can freely install the drawer, box, Storage cabinet, Purses and the like can be expected to improve these security features. If taken: Constituted as With sensing means 10 for detecting the presence of people, and, A lock device is provided for the storage device 2 which may store various articles, Signaling means 15 for operating signals used to lock or unlock it, And after the departure of the authenticated user, The authentication method of returning users with legitimate authority, When the above-mentioned signal transmitting means 15 detects the absence of the user through the above-mentioned sensing means 10, Send out a signal to perform the operation of locking the above locking device. And after the certification by the above certification means 13 is completed, Send out an information processing device 3 (system) for implementing the operation signal for unlocking the above locking device, It is also possible to construct a simple security system. Moreover, the above locking device is only in a state of being unlocked for a period of time when an operation signal for unlocking is received (when the operation signal for unlocking cannot be accepted and it moves to the locked state), Can be structured as When the above-mentioned signal sending and sending means 15 passes the sensing means 10 and the user's absence is detected, Stop sending signal, When a user with proper authority is executed by the authentication means 13, Restarting the operation of the signal is also possible -63- (60) 200416552 Yes. Thanks to: When the fact that the certification by the above authentication means 13 is unsuccessful (failure) is sensed, Or not authenticated by the above-mentioned authentication user, When one of the storage devices 2 has been operated, one of them is less. The "illegal storage means 1 6" is generated by generating information about this fact, so it is possible for the intended recipient, The accumulative information on the misconduct of the third person of the computer 6 or the storage device 2 is accumulated for the reference for the future. Of course, the other effects described in the first and fourth embodiments can also be achieved. but, This embodiment is not limited to the above-mentioned components, and various modifications are still made. First of all, Sensing means 1 〇, Aspects of authentication means 13 are examples that are not described. As described in the third or fourth embodiment, After the user ’s departure, “when appearing in the workspace with a positive user” does not accept the user ’s own user input, Instead, it is also possible to obtain user identification information previously stored in the device and stored in the device M. Prescribed memory device M, You can use: R F 1D logo, Portable information processing terminal with wireless communication function, etc. As shown in Figure 2-9, The control device 4 is installed to wirelessly acquire the user identification information with the memory device M held by the wireless communication for 4 h. The specific aspect of the wireless communication device 4 h is to respond to the actual recognition of the means 13 by the user to obtain information and output the information. Or needless to say that the specific memory is limited to a certain type of information that is considered to be authorized, and has, for example, a memory device M provided by a user communication device user-64- (61) (61) 200416552. Appearance. To illustrate, If the specified memory device M is an RFID tag with electronic induction method, It will be a coil (antenna) that contains an induction voltage in the induction coil in the R F I D mark. When the specified memory device M is the RF1D mark of the light mode It will contain an infrared communication device that performs infrared communication with the R F ID mark. Or, for communication with portable information processing terminals such as Bluetooth (trademark) and other data communication interphones are also possible. Furthermore, Wireless communication device that implements user identification information with the specified memory device M for 4h, And the wireless interphone 4b used for signal receiving and receiving with the storage device monitoring device 5 may be another or the same. 〇 Plus, If the specified memory device M exists together with the user, the previous conditions exist, Sensing the presence of a prescribed memory device M, It is synonymous with sensing the presence of users. Therefore, the sensing means 10 for the presence or absence of people and the authentication means 13 for user authentication can share the same hardware resources. To elaborate, The wireless communication device 4h that implements wireless communication with the specified memory device M is used to form the sensing means 10, When communication with the specified memory device M is interrupted, When the user is deemed not to have established the communication, That is to say, the user exists. at this time, Since the specified memory device M and the wireless communication device 4h become the elements of the sensing means 10 and the authentication means 13 of the present invention, Therefore, the control device 4 does not need to be equipped with a human sensor 4a, Input device 4d. Of course (not shown in Figure 29) Installed input device 4d, The authentication of a memory device M using an RFID tag or the like and the authentication of user identification information such as entering a password through the input device 4d and -65- (62) (62) 200416552 can also be selected. . In this way, "if you do n’t have a memory device M," you can still use the password to perform user authentication. Therefore, the security function of the storage device 2 (the function of detecting and reporting improper operations) is released Computer 6 security functions (picture processing, Retention processing) and other systems that can be released from security. Furthermore, As shown in Figures 3-9, The storage monitoring device 5 may be provided with a wireless communication device 5f for obtaining user identification information from a memory device M held by the user. at this time, The user authentication process is performed without using the control device 4 but with the storage device monitoring device 5. As mentioned earlier, The storage device monitoring device 5 is provided with a light sensor 5a shown in Figs. Light emitting device 5b and / or sound take-out device 5c, Hardware resources such as the control circuit 5d, And the control device 11 (the sensing unit 51, Responsibilities of the sending department 5 2). In addition, the control circuit 5d (sometimes a computer or a program interpreted and executed by the computer is sometimes stored in a memory 5g described below) to control the wireless communication device 5f, And between the required memory device M held by the user, Implementation of user identification information. on the other hand, It is pre-stored in the specified memory area where the control circuit 5 d memory 5 g is connected by bus, User identification information about users with proper authority. and, The control circuit 5d is compared, User identification information read by a prescribed memory device M, And user identification information stored in a memory 5 g of a user with proper authority, It is determined whether the person with the memory device M is a proper user. When it is judged that the holder of the memory device M is a proper user, That is, the security function related to the storage device 2 is released. In other words, when the sensing unit 51 senses that -66-(63) (63) 200416552 operation of the storage device 2 'is not performed, the report by the light emitting device 513 and / or the sound output device 5c is not performed. Control device 5 d series, Intermittent or continuous communication with the above-mentioned memory device M via the wireless communication device 5f (the timing at which the user identification information is obtained by the memory device μ can be appropriately changed). The user identification information stored in the memory device M is obtained. And confirm (verify) one by one whether the user is a user with proper authority. When user identification information about a user with legitimate rights cannot be accepted, It is determined that the user has left the seat and started to perform the security function regarding the storage device 2. Conversely, if user identification information about a user with proper authority is accepted, the user is deemed to be returning or returning, And the security function of the storage device 2 is released. In other words, the wireless communication device 5f that performs wireless communication with the specified memory device M constitutes the sensing means 10. At this time, the wireless communication device 5 f and the control circuit 5 d that performs comparison of the user identification information become elements of the authentication means 13 related to the present invention. And controlling the light emitting device 5b, The control circuit 5d of the sound output device 5c is a release means 14 for releasing the control of the security function. In this way, That is, the security function can be activated / deactivated because it does not depend on the control device 4, Therefore, it is not necessary to match the control device with 4 sets of land. Can be used alone. Furthermore, In the corresponding user land, There are multiple control devices 4 in their respective working spaces, When each of the computers 6 connected to these control devices 4 is connected via an electrical path circuit (loop), The information about the presence / absence of the user is sensed through the sensing means 1 〇 installed in the control device 4. May also send messages to other users -67- (64) 200416552 Brain 6. Computer 6 at this time is in accordance with the program, The function of presenting information about the current status of users who use the electricity month is sent to other users. The computer 6 of a certain user is usually the receiving address for sending information to other computers 6 (sometimes indicating the address of the computer 6 used by other computers, Or sometimes directing messages to others, The address of a computer (not shown) as a relay) is stored in the main memory 6b or in the auxiliary memory device 6c. And when the sensing means 1 〇 detects the user ’s absence, Send the information indicating the use of the absence to the receiving address memorized, As a result, his users were notified. When using the authentication method 13 to confirm that the user has the right, I also send the information returned by me to the receiving address I remember, It can be reported to other users as well. also, The present invention is not limited to the embodiments described in detail above. The invention is not limited to use on personal computers, workstation, Or P D A, Can also be applied to DVD players, Hardware video recorder, Video even wait. The specific composition of the other parts, Or in Figure 6, Figure 9, Figure, Figure 17, Figure 26, And the processing sequence shown in the flowchart in FIG. 27 is not limited to the above embodiment. Various modifications can be made within the scope of the present invention. (Industrial use possibility) g 6 The information sender user uses the information author to his users, such as the procedure of the 14th stage of the theater • 68- (65) (65) 200416552 As detailed above The present invention can construct an information processing device that can activate a security function represented by a screen saver if necessary without complicated operations. [Brief description of the drawings] Fig. 1 is a diagram showing a hardware resource configuration of an information processing apparatus according to an embodiment of the present invention. Fig. 2 shows a functional block diagram of an information processing device in the same embodiment. Fig. 3 shows an example of a screen for displaying information. Fig. 4 shows an example of screen processing by the control means. Fig. 5 is a diagram showing an example of urging input of user identification information (authentication display) by authentication means. Fig. 6 shows a flowchart of a processing procedure in the same embodiment. Fig. 7 is a diagram showing a mode of an information processing apparatus according to an embodiment of the present invention. Fig. 8 is a diagram showing a hardware resource configuration of the information processing apparatus of the same embodiment. Fig. 9 shows a flowchart of a processing procedure in the same embodiment. Fig. 10 is a diagram illustrating the structure of the present invention. Fig. 11 is a diagram illustrating the structure of the present invention. Fig. 12 is a diagram schematically showing an information processing apparatus according to an embodiment of the present invention. Figure 13 shows the hardware resources of the information processing device of the same embodiment. (69) (66) (66) 200416552 Structure diagram. FIG. 14 shows a flowchart of a processing procedure in the same embodiment. Fig. 15 is a diagram showing a mode of an information processing apparatus according to an embodiment of the present invention. Fig. 16 is a diagram showing a hardware resource configuration of the information processing device in the same embodiment. Fig. 17 shows a flowchart of a processing procedure in the same embodiment. Fig. 18 is a diagram for explaining the structure of the present invention. Fig. 19 is a diagram illustrating the structure of the present invention. Fig. 20 is a diagram illustrating the structure of the present invention. Fig. 21 shows a circuit configuration diagram of a sensing means combining a human sensor and a distance sensor. Fig. 22 illustrates a timing chart of the operation of the same sensing means. Fig. 23 is a diagram schematically showing an information processing apparatus (system) according to an embodiment of the present invention. Fig. 24 is a hardware resource configuration diagram of the storage device monitoring device in the same embodiment. Fig. 25 is a hardware resource configuration diagram of a control device in the same embodiment. Fig. 26 shows a flowchart of a processing procedure in the same embodiment. Fig. 27 shows a flowchart of a processing procedure in the same embodiment. Fig. 28 is a diagram showing a hardware resource configuration of a computer in the same embodiment. Fig. 29 is a hardware resource configuration diagram of the control device of the same embodiment. Figure 30 is a circuit diagram showing an example of the power supply circuit of the storage device monitoring device. • 70- (67) (67) 200416552. Fig. 31 is a diagram showing the mode of the information processing device (system) of the same embodiment. Fig. 32 is a diagram showing a storage device monitoring device of the same embodiment. Fig. 33 shows a perspective view of the storage device monitoring device in the same embodiment. Figure 34 shows the perspective view of the main part of the setting key and the DIP switch. Fig. 35 shows a perspective view of the main part of the setting key and the DIP switch. Fig. 36 shows a longitudinal sectional view of the main part of the setting key and the DIP switch. Fig. 37 shows a horizontal sectional view of the main part of the setting key and the DIP switch. Fig. 38 shows a horizontal sectional view of the main part of the setting key and the DIP switch. Fig. 39 shows the storage of the same embodiment. Diagram of hardware resources with monitoring device. [Symbol description] 1 information processing device la processor lb main memory lc auxiliary memory device Id display le display control device 1 e 1 video chip le2 video memory -71-(68) 200416552
If 輸 入 裝 置 i g 人 感 感 測 口 α 益 1 h 輸 入 參 出 接 □ 1 i 並 > 1 \ N 線 通 訊 裝 置 Ij 訊 號 接 □ 2 收 納 具 2 a 上 鎖 裝 置 3 訊 處 理 裝 置 4 控 制 裝 置 4 a 人 感 感 測 器 4b 並 線 對 講 機 4 c 顯 示 裝 置 4d 輸 入 裝 置 4 e 通 訊 接 □ 4f 控 制 電 路 4g 記 憶 器 4h > ΐ \\ 線 通 訊 裝 置 5 收 納 具 監 護 裝置 5a 光 感 測 器 5b 發 光 裝 置 5c 聲 音 輸 出 裝 置 5d 控 制 電 路 5e Μ 線 對 講 機 5f Μ j \\\ 線 通 訊 裝 置If input device ig human sensing port α yi 1 h input input connection □ 1 i and> 1 \ N line communication device Ij signal connection □ 2 storage device 2 a lock device 3 signal processing device 4 control device 4 a Human sensor 4b Parallel line intercom 4 c Display device 4d Input device 4 e Communication connection 4f Control circuit 4g Memory 4h > ΐ \\ Line communication device 5 Storage device monitoring device 5a Light sensor 5b Light emitting device 5c Sound output device 5d Control circuit 5e Μ Line intercom 5f Μ j \\\ Line communication device
-72- (69)200416552 5 g 記憶器 5h 半導體開關 5 i 電路基板 5 1 感測部 5 2 發報部 53 操作訊號接受部 6 電腦-72- (69) 200416552 5 g memory 5h semiconductor switch 5 i circuit board 5 1 sensing section 5 2 transmitting section 53 operating signal receiving section 6 computer
6 a 處理器 6b 主記憶器 6c 補助記憶裝置 6 d 顯示器 6e 顯示控制裝置 6f 輸入裝置 6g 通訊接口6 a processor 6b main memory 6c auxiliary memory device 6 d display 6e display control device 6f input device 6g communication interface
7 D.I.P(雙列直插)開關 71 操作部 8 設定鍵 8 1 卡合緣 8 2 迴避溝 9 芸 7 ΓΤΠ. 9 1 開□ 92 導引構件 93 凸條 94 擋止部 -73- (70) (70)200416552 10 感測手段 11 控制手段 13 認證手段 14 控制之解除手段 15 訊號發訊手段 16 不正當存取資訊輸出手段 Μ 記憶裝置 Ζ 負載 ⑩ Β 電池7 DIP (Dual In-Line) switch 71 Operating section 8 Setting key 8 1 Engagement edge 8 2 Avoiding groove 9 Yun 7 ΓΤΠ. 9 1 Open □ 92 Guide member 93 Projection 94 Stopper-73- (70) (70) 200416552 10 Sensing means 11 Control means 13 Authentication means 14 Control releasing means 15 Signal transmission means 16 Improper access information output means M Memory device Z Load ⑩ Battery
-74--74-