Controlled device, security management method, and security management system

ABSTRACT

A security management system includes a controlled device to execute a security management method. The controlled device includes a wireless module and a processing module. The processing module communicates with a main controlling device through the wireless module for pairing. When the main controlling device is successfully paired to the controlled device, the processing module executes a security mode. In the security mode, a user directly operates the controlled device. When the controlled device is not successfully paired to the main controlling device, the controlled device cannot execute the security mode, and the controlled device cannot be operated. Therefore, the user only needs to ensure that the main controlling device is nearby; even if the user is at a position distanced from the controlled device, the controlled device may not be operated by others.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the priority benefit of TW application serialNo. 106117137, filed on May 24, 2017, and the priority benefit of TWapplication serial No. 106138256, filed on Nov. 6, 2017. The entirety ofthe above-mentioned patent applications is hereby incorporated byreference herein and made a part of the specification.

BACKGROUND OF THE INVENTION 1. Field of the Invention

The present invention relates to a management method and a managementsystem, and more particularly to a controlled device, a securitymanagement method, and a security management system.

2. Description of the Related Art

Computers are currently one of the most commonly used electronicdevices. For users, the computers often store a great amount of personalinformation, such as user accounts, passwords and even a scanned file ofan ID card of the user, or other personal privacy-sensitive information.

Therefore, the user usually locks access to the computer by accountinformation and a password. When the user needs to use the computer, theuser must firstly enter the account information and the password to login an operating system of the computer. Then the user may operate thecomputer normally. In this way, the personal privacy-sensitiveinformation of the user may be prevented from being accessed byunauthorized persons.

However, the user must firstly enter the account information and thepassword to unlock the computer so as to operate the computer. It isinconvenient for the user to take any further action before the useroperates the computer.

Furthermore, when the user needs to enter the account information andthe password, if other people are beside the user, it is easy for othersto peek and obtain the account information and the password. If the userof the computer directly asks other people to divert their attention toelsewhere, that easily leads to an embarrassing situation. Therefore,the technique of preventing the personal privacy-sensitive informationfrom being accessed needs to be further improved.

SUMMARY OF THE INVENTION

An objective of the present invention is to provide a controlled device,a security management method, and a security management system. Thepresent invention may be conveniently operated by a user, and the userdoes not need to ask other people to divert their attention. Therefore,the user may not encounter any embarrassment, and the personalprivacy-sensitive information may be prevented from being accessed andstolen.

The controlled device includes a wireless connecting module and aprocessing module.

The wireless module communicates with a main controlling device.

The processing module is electrically connected to the wireless module,and communicates with the main controlling device through the wirelessmodule for pairing. When the controlled device is successfully paired tothe main controlling device, the processing module of the controlleddevice executes a security mode.

Further, the security management method is executed by the controlleddevice, and includes steps of:

communicating with a main controlling device for pairing;

determining whether the main controlling device is successfully pairedto the controlled device; and

when the main controlling device is successfully paired to thecontrolled device, executing a security mode.

Moreover, the security management system includes a main controllingdevice and a controlled device.

The controlled device includes a wireless connecting module and aprocessing module. The wireless module communicates with a maincontrolling device.

The processing module is electrically connected to the wireless module,and communicates with the main controlling device through the wirelessmodule for pairing. When the controlled device is successfully paired tothe main controlling device, the processing module of the controlleddevice executes a security mode.

The present invention pairs the controlled device and the maincontrolling device. When the controlled device is successfully paired tothe main controlling device, the processing module of the controlleddevice executes the security mode. In the security mode, a user of thecontrolled device may directly operate the controlled device. Namely,the controlled device only can be operated by the user when thecontrolled device executes the security mode. When the controlled deviceis not successfully paired to or connected with the main controllingdevice, the controlled device may not execute the security mode, and thecontrolled device may not be operated. Therefore, the user only needs toensure that the main controlling device is nearby, and even if the useris at a position distanced from the controlled device, the controlleddevice may not be operated by others.

In addition, in the security mode, the controlled device canautomatically enter data. When the user needs to enter accountinformation and a password, the controlled device in the security modewill be able to automatically enter the account information and thepassword. Therefore, the user does not need to invite others to diverttheir attention, and the data may be automatically entered. Hence, thepresent invention may provide the user with a convenient and safe way toenter data.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a security management system of the presentinvention;

FIG. 2 is a flowchart of a first embodiment of a security managementmethod of the present invention;

FIG. 3 is a flowchart of a second embodiment of a security managementmethod of the present invention;

FIG. 4 is a flowchart of a third embodiment of a security managementmethod of the present invention;

FIG. 5 is a flowchart of an embodiment of a security managementprocedure of a security management method of the present invention;

FIG. 6 is another flowchart of a security management procedure of asecurity management method of the present invention;

FIG. 7 is still another flowchart of a security management procedure ofa security management method of the present invention;

FIG. 8 is another block diagram of a security management system of thepresent invention.

DETAILED DESCRIPTION OF THE INVENTION

With reference to FIG. 1, the present invention relates to a controlleddevice, a security management method, and a security management system.The security management system includes the controlled device 10 and amain controlling device 20. The controlled device 10 communicates withthe main controlling device 20 and includes a wireless module 11 and aprocessing module 12.

The controlled device 10 communicates with the main controlling device20 through the wireless module 11. The processing module 12 iselectrically connected to the wireless module 11 and communicates withthe main controlling device 20 through the wireless module 11 forpairing. When the controlled device 10 is successfully paired to themain controlling device 20, the processing module 12 of the controlleddevice 10 executes a security mode. In an embodiment, when thecontrolled device 10 is not successfully paired to the main controllingdevice 20, the controlled device 10 maintains an original state.

For example, the original state of the controlled device 10 may be alocked state to wait for a user of the controlled device 10 to input apassword. When the controlled device 10 is not successfully paired tothe main controlling device 20, the controlled device 10 maintains thelocked state.

Further, with reference to FIG. 2, the security management method isexecuted by the controlled device 10, and a first embodiment of thesecurity management method includes steps of:

communicating with a main controlling device 20 for pairing (S201);

determining whether the main controlling device 20 is successfullypaired to the controlled device 10 (S202);

when the main controlling device 20 is successfully paired to thecontrolled device 10, executing a security mode (S203);

when the main controlling device 20 is not successfully paired to thecontrolled device 10, maintaining an original state (S204).

The present invention pairs the controlled device 10 and the maincontrolling device 20. When the controlled device 10 is successfullypaired to the main controlling device 20, the controlled device 10executes the security mode. In the security mode, a user of thecontrolled device 10 may directly operate the controlled device 10. Whenthe controlled device 10 is not successfully paired to the maincontrolling device 20, the controlled device 10 maintains the originalstate. Therefore, the user only needs to ensure that the maincontrolling device 20 is nearby, and the user may directly andconveniently operate the controlled device 10 without entering accountinformation or a password.

In addition, when the user needs to enter the account information or thepassword, if other people are beside the user, it is easy for others topeek and obtain the account information and the password. If the userdirectly asks other people to divert their attention, that easily leadsto an embarrassing situation. Therefore, in the security mode, thecontrolled device 10 can automatically enter data. The user does notneed to invite others to divert their attention, and the data may beautomatically entered. Hence, the present invention may provide the userwith a convenient and safe way to enter data.

With reference to FIG. 1, when the processing module 12 of thecontrolled device 10 executes the security mode, the controlled device10 may automatically login an operation system of the controlled device10. For example, when the controlled device 10 and the main controllingdevice 20 are successfully paired, the controlled device 10 mayautomatically login the operation system of the controlled device 10,and the user may directly operate the controlled device 10. However,when the controlled device 10 and the main controlling device 20 are notsuccessfully paired, the controlled device 10 may not login theoperation system of the controlled device 10, and the controlled device10 maintains the original state. Therefore, personal privacy-sensitiveinformation of the user stored in the controlled device 10 may beprotected.

In another embodiment, when the processing module 12 executes thesecurity mode, the processing module 12 allows a predeterminedapplication to be executed, allows a predetermined web browser to browsea predetermined webpage, or allows a predetermined application to open apredetermined data file. For example, the predetermined application maybe an email application, the predetermined webpage may be an email loginwebpage browsed by the predetermined web browser, and the predetermineddata file may be a text data file opened by a text editing application.When the controlled device 10 and the main controlling device 20 aresuccessfully paired, the processing module 12 allows the emailapplication to be executed, allows the email login webpage to be browsedby a web browser, or allows the text editing application to open thetext data file. In other words, when the controlled device 10 and themain controlling device 20 are not successfully paired, the emailapplication may not be executed, the email login webpage may not bebrowsed, or the text data file may not be opened. Thereby, thecontrolled device 10 is provided with greater security.

In the other embodiment, when the controlled device 10 and the maincontrolling device 20 are successfully paired, the processing module 12further determines whether signal strength for communicating with themain controlling device 20 is greater than a predetermined thresholdvalue for a predetermined time period. When the signal strength forcommunicating with the main controlling device 20 is greater than thepredetermined threshold value for the predetermined time period, thecontrolled device 10 executes the security mode. Otherwise, thecontrolled device 10 maintains the original state.

With reference to FIG. 3, a second embodiment of the security managementmethod includes steps of:

communicating with a main controlling device 20 for pairing (S301);

determining whether the main controlling device 20 is successfullypaired to the controlled device 10 (S302);

when the main controlling device 20 is successfully paired to thecontrolled device 10, determining whether signal strength forcommunicating with the main controlling device 20 is greater than apredetermined threshold value for a predetermined time period (S303);

when the signal strength for communicating with the main controllingdevice 20 is greater than the predetermined threshold value for thepredetermined time period, executing a security mode (S304);

when the signal strength for communicating with the main controllingdevice 20 is not greater than the predetermined threshold value for thepredetermined time period, maintaining an original state (S305).

With reference to FIG. 1, in one embodiment, the main controlling device20 detects signal strength for communicating with the controlled device10, and the main controlling device 20 further determines a duration oftime during which the signal strength for communicating with thecontrolled device 10 is greater than the predetermined threshold value.The main controlling device 20 transmits information of the duration tothe controlled device 10. The controlled device 10 receives theinformation of the duration from the main controlling device 20 todetermine whether the duration is longer than the predetermined timeperiod.

When the duration is longer than the predetermined time period, thecontrolled device 10 determines that the signal strength forcommunicating with the main controlling device 20 is greater than thepredetermined threshold value for the predetermined time period. Whenthe duration is not longer than the predetermined time period, thecontrolled device 10 determines that the signal strength forcommunicating with the main controlling device 20 is not greater thanthe predetermined threshold value for the predetermined time period.

In another embodiment, the main controlling device 20 detects the signalstrength for communicating with the controlled device 10, and transmitsthe signal strength for communicating with the controlled device 10 tothe controlled device 10. The processing module 12 receives the signalstrength for communicating with the controlled device 10 through thewireless module 11. The processing module 12 further determines theduration of time during which the signal strength for communicating withthe controlled device 10 is greater than the predetermined thresholdvalue, and the controlled device 10 determines whether the duration islonger than the predetermined time period.

When the duration is longer than the predetermined time period, theprocessing module 12 determines that the signal strength forcommunicating with the main controlling device 20 is greater than thepredetermined threshold value for the predetermined time period.Otherwise, when the duration is not longer than the predetermined timeperiod, the controlled device 10 determines that the signal strength forcommunicating with the main controlling device 20 is not greater thanthe predetermined threshold value for the predetermined time period.

Further, before the controlled device 10 communicates with the maincontrolling device 20 for pairing, the processing module 12 determineswhether a key device 30 is electrically connected to the controlleddevice 10. When the key device 30 is electrically connected to thecontrolled device 10, the processing module 12 directly executes thesecurity mode. When the key device 30 is not electrically connected tothe controlled device 10, the controlled device 10 communicates with themain controlling device 20 for pairing.

Thereby, two ways are provided for the user to allow the processingmodule 12 to execute the security mode. Hence, the present inventionprovides a more flexible security management method. In the embodiment,the controlled device 10 may be, but is not limited to, a desktopcomputer, a notebook computer, an electronic device such as a smartphone or a programmable machine. The processing module 12 may be, but isnot limited to, a processor. The main controlling device 20 may be aportable electronic device such as, but not limited to, a computer, asmart phone, a sports bracelet, a wireless mouse, a wireless keyboard ora player. The key device 30 may be a flash drive, an etoken, or thelike, but it is not limited thereto. The wireless module 11 ispreferably, but not limited to, a Bluetooth module.

With reference to FIG. 4, a third embodiment of the security managementmethod includes steps of:

determining whether a key device 30 is electrically connected (S401);

when the key device 30 is electrically connected, executing a securitymode (S402);

when the key device 30 is not electrically connected, communicating withthe main controlling device 20 for pairing (S403);

determining whether the main controlling device 20 is successfullypaired to the controlled device 10 (S404);

when the main controlling device 20 is successfully paired to thecontrolled device 10, determining whether signal strength forcommunicating with the main controlling device 20 is greater than apredetermined threshold value for a predetermined time period (S405);

when the signal strength for communicating with the main controllingdevice 20 is greater than the predetermined threshold value for thepredetermined time period, executing the security mode (S402);

when the signal strength for communicating with the main controllingdevice 20 is not greater than the predetermined threshold value for thepredetermined time period, or when the main controlling device 20 is notsuccessfully paired to the controlled device 10, maintaining an originalstate (S406).

Further, with reference to FIG. 5, when the processing module 12executes the security mode, the processing module 12 executes a securitymanagement procedure. The security management procedure includes stepsof:

determining whether an application or a webpage contains at least onefield to be filled in (S501);

when the application or the webpage contains the at least one field tobe filled in, transmitting a notification information to the maincontrolling device 20 (S502).

In the embodiment, the application may be an operation system of acomputer or a smartphone or a program installed in the computer or thesmartphone.

When the controlled device 10 determines that the application or thewebpage contains the at least one field to be filled in, the controlleddevice 10 may transmit the notification information to the maincontrolling device 20 to remind the user that the application or thewebpage executed by the main controlling device 20 contains the at leastone field to be filled in. Then, the user may directly determine whetherthe controlled device 10 is operated by an authorized user. Therefore,the controlled device 10 may not be operated by an unauthorized user,and the personal privacy-sensitive information of the user stored in thecontrolled device 10 may be protected.

For example, the controlled device 10 may be a computer. In the securitymode, the controlled device 10 logs out the operation system of thecontrolled device 10, and is in a locked state. In the locked state,there are fields to be filled in, and the fields may be filled in withthe account information and the password. The controlled device 10 maytransmit the notification information to the main controlling device 20to remind the user that a current state of the main controlling device20 contains at least one field to be filled in. Therefore, the user maybe informed as early as possible that the controlled device 10 may belogged in soon by others. The user may directly confirm an identity of aperson who is using the controlled device 10, and the personalprivacy-sensitive information of the user stored in the controlleddevice 10 may be prevented from being accessed and stolen.

The security management procedure further includes steps of:

determining whether data filled in the at least one field is correct(S503);

when the data filled in the at least one field is correct, transmittingcorrect reminder information to the main controlling device 20 (S504);

when the data filled in the at least one field is incorrect,transmitting wrong reminder information to the main controlling device20 (S505).

Namely, after the at least one field is filled in, the securitymanagement procedure may further determine whether the data filled inthe at least one field is correct. When the data filled in the at leastone field is correct, the controlled device 10 transmits the correctreminder information to the main controlling device 20 to notify theuser. Therefore, the user may determine that the person who is using thecontrolled device 10 can load any information stored in the controlleddevice 10. The user may directly confirm the identity of the person whois using the controlled device 10, and the personal privacy-sensitiveinformation of the user stored in the controlled device 10 may beprevented from being accessed and stolen.

When the data filled in the at least one field is incorrect, thecontrolled device 10 may transmit the wrong reminder information to themain controlling device 20 to notify the user. Therefore, the user maydetermine that the person who is using the controlled device 10 inputswrong data, and the user may directly confirm whether the controlleddevice 10 is used by an unauthorized person.

In the embodiment, the at least one field to be filled in may be abiometric identification data field for the user to input biologicalidentification information such as fingerprint or facial recognition.When the user inputs the biometric identification information, thecontrolled device 10 transmits the correct reminder information or thewrong reminder information to the main controlling device 20 accordingto the recognition result. Therefore, the user may know that someone iscurrently trying to log in to the controlled device 10, so that the usercan directly determine an identity of the one who is currently using thecontrolled device 10.

With reference to FIG. 6, after the step S502, the security managementprocedure further includes steps of:

transmitting permission confirmation information to the main controllingdevice 20 (S601);

determining whether permission information and automatic fillinginformation are received from the main controlling device 20 (S602);

when the permission information and the automatic filling informationare received from the main controlling device 20, automatically fillingin the at least one field contained in the application or the webpage(S603), and executing the step S503.

In this way, when the controlled device 10 determines that theapplication or the webpage contains the at least one field, thecontrolled device 10 not only transmits the notification information tothe main controlling device 20, but also transmits the permissionconfirmation information to the main controlling device 20. When thecontrolled device 10 receives the permission information and theautomatic filling information returned by the main controlling device20, the controlled device 10 can automatically fill in the at least onefield contained in the application or the webpage according to theautomatic filling information. Namely, the controlled device 10 canreceive the automatic filling information transmitted from the maincontrolling device 20 to automatically fill data in the at least onefield.

Since the automatic filling information is transmitted by the maincontrolling device 20, the user does not need to manually input the datain the at least one field and may store the data in the main controllingdevice 20. When the main controlling device 20 is nearby the controlleddevice 10, the controlled device 10 may execute the security managementprocedure to automatically fill the data in the at least one field.Therefore, the user does not need to memorize the data to be input.Further, since the main controlling device 20 is held by the user, theconfidentiality of the data to be input may be protected by the user.

In the embodiment, the data to be filled in the at least one field whichthe controlled device 10 can automatically input may be a name, phonenumber, address, etc. of a purchaser to be filled in a checkout webpageof a shopping website, or may be a credit card number, depending onusage.

In another embodiment, when the controlled device 10 executes apredetermined program to open an encrypted data file, the controlleddevice 10 may automatically input the password to decrypt the encrypteddata file.

For example, when the user wants to open an encrypted text file, theuser may use the controlled device 10 to execute a text editing programto open the encrypted text file. When the text editing program opens theencrypted text file, it is required to input a password at first todecrypt the encrypted text file. In this case, when the controlleddevice 10 is successfully paired to the main controlling device 20 toexecute the security mode, the controlled device 10 may automaticallyinput the password. Therefore, the user need not manually input thepassword, and the password may be automatically inputted to open theencrypted text file.

With reference to FIG. 7, when the main controlling device 20 receivesthe permission confirmation information (S701), the main controllingdevice 20 determines whether to produce the permission information(S702). When the main controlling device 20 produces the permissioninformation, the main controlling device 20 further determines theautomatic filling information is stored in the main controlling device20 (S703). When the main controlling device 20 determines that the maincontrolling device 20 stores the automatic filling information, the maincontrolling device 20 transmits the permission information and theautomatic filling information to the controlled device 10 (S704). Thepermission confirmation information transmitted by the controlled device10 includes field information. When the main controlling device 20determines that the main controlling device 20 does not store theautomatic filling information, the main controlling device 20 transformsthe field information to an automatic filling field, and the maincontrolling device 20 displays the automatic filling field. The maincontrolling device 20 further produces the automatic filling informationaccording to an operation of a user. The main controlling device 20stores the automatic filling information, and the main controllingdevice 20 transmits the permission information and the automatic fillinginformation to the controlled device 10 (S705).

For example, when the controlled device 10 executes an operating system,the operating system may enter the locked state first and provide anaccount information field and a password field to be filled in by theuser. At this time, the controlled device 10 transmits the reminderinformation to the main controlling device 20 to remind the user of themain controlling device 20 that the controlled device 10 is being used.And the controlled device 10 transmits the permitting confirmationinformation to the main controlling device 20.

When the user of the main controlling device 20 confirms that the personwho is using the controlled device 10 is authorized, the user canoperate the main controlling device 20 to generate the permissioninformation. The main controlling device 20 further determines whetherthe automatic filling information is stored in the main controllingdevice 20. When the main controlling device 20 stores the automaticfilling information, the main controlling device 20 transmits thepermission information and the automatic filling information to thecontrolled device 10. The controlled device 10 may automatically inputthe data in the at least one field of the application or the webpage.

However, when the automatic filling information is not stored in themain controlling device 20, the main controlling device 20 generates theautomatic filling field according to the field information, and the maincontrolling device 20 produces the automatic filling informationaccording to the operation of a user. The main controlling device 20stores the automatic filling information, and transmits the permissioninformation and the automatic filling information to the controlleddevice 10. Therefore, the user only needs to operate the maincontrolling device 20, and the controlled device 10 may automaticallyinput data. Further, the automatic filling information can be stored inthe main controlling device 20. When the user opens the application orthe webpage again, the user may not need to input the data again. Theuser only needs to operate the main controlling device 20 to generatethe permission information, and the data may be automatically inputtedin the at least one field. The controlled device 10 and the maincontrolling device 20 provide a convenient environment for the user.

When the main controlling device 20 automatically inputs the automaticfilling information in the at least one field of the application programor the webpage, the controlled device 10 wirelessly receives theautomatic filling information from the main controlling device 20.Namely, the controlled device 10 does not store the automatic fillinginformation. Since the automatic filling information is not stored inthe controlled device 10 but stored in the main controlling device 20,and the main controlling device 20 is less likely to be lost, theautomatic filling information has a higher security.

With reference to FIG. 8, the controlled device 10 further includes astorage module 13. The storage module 13 stores the above-mentionedautomatic filling information. The automatic filling information is datathat the processing module 12 automatically inputs in the at least onefield of the application or the webpage.

After the controlled device 10 executes the security managementprocedure to transmit the notification information to the maincontrolling device 20, the controlled device 10 further transmits thepermission confirmation information to the main controlling device 20.The controlled device 10 determines whether the permission informationtransmitted by the main controlling device 20 is received. When thecontrolled device 10 determines that the permission information isreceived, the controlled device 10 fills in the at least one field ofthe application or the webpage according to the automatic fillinginformation stored in the storage module 13.

Therefore, since the controlled device 10 and the main controllingdevice 20 are successfully paired, the user may hold the maincontrolling device 20 nearby the controlled device 10, and the user maydirectly use the controlled device 10, or the user may know who is usingthe controlled device 10. Then, the processing module 12 may execute thesecurity mode. Therefore, when the at least one field of the applicationor the webpage needs to be filled in, the processing module 12 maydirectly input the automatic filling information in the at least onefield according to the automatic filling information stored in thestorage module 13. The user may conveniently use the controlled device10.

For example, the main controlling device 20 can be a wristband worn onthe user. Therefore, when the user is using the controlled device 10 ornearby the controlled device 10, the controlled device 10 cancommunicate with and can be paired to the main controlling device 20,and the controlled device 10 may execute the security mode. When theapplication or the webpage includes the at least one field, thecontrolled device 10 can directly read the automatic filling informationstored in the storage module 13, and the controlled device 10 mayautomatically input the automatic filling information in the at leastone field.

In addition, in a further embodiment, the main controlling device 20 isconnected to the controlled device 10, and the main controlling device20 determines whether an application opening instruction is generated.When the main controlling device 20 determines that the applicationopening instruction is generated, the main controlling device 20transmits an application executing instruction and the automatic fillinginformation to the controlled device 10.

When the controlled device 10 receives the application executinginstruction and the automatic filling information, the controlled device10 executes a predetermined application, and inputs data in the at leastone field of the predetermined application according to the automaticfilling information.

Namely, in the embodiment, the user can operate the main controllingdevice 20 to generate the application executing instruction, and thecontrolled device 10 may directly execute the predetermined application,and automatically input data according to the automatic fillinginformation in the at least one field of the predetermined application.

The user of the main controlling device 20 can directly open thepredetermined application in the controlled device 10 by operating themain controlling device 20, and the main controlling device 20 cantransmit the automatic filling information to the controlled device 10.Therefore, the controlled device 10 may automatically fill the data inthe at least one field of the predetermined application, and the usermay conveniently operate the controlled device 10.

For example, the user can generate the application opening instructionby operating the mobile phone, as the main controlling device 20, toallow the computer, as the controlled device 10, to execute thepredetermined application. At the same time, the mobile device furthertransmits the automatic filling information to the computer to allow thecomputer to automatically input the data in the at least one field ofthe predetermined application according to the automatic fillinginformation. Therefore, the user can directly execute the predeterminedapplication through the computer without inputting data, and the usermay conveniently use the controlled device 10.

Even though numerous characteristics and advantages of the presentinvention have been set forth in the foregoing description, togetherwith details of the structure and function of the invention, thedisclosure is illustrative only. Changes may be made in detail,especially in matters of shape, size, and arrangement of parts withinthe principles of the invention to the full extent indicated by thebroad general meaning of the terms in which the appended claims areexpressed.

What is claimed is:
 1. A security management method, executed by acontrolled device, and the security management method comprising stepsof: communicating with a main controlling device for pairing;determining whether the main controlling device is successfully pairedto the controlled device; and when the main controlling device issuccessfully paired to the controlled device, executing a security mode;wherein when the main controlling device is successfully paired to thecontrolled device, the controlled device further determines whethersignal strength for communicating with the main controlling device isgreater than a predetermined threshold value for a predetermined timeperiod; and when the signal strength for communicating with the maincontrolling device is greater than the predetermined threshold value forthe predetermined time period, the controlled device executes thesecurity mode; and wherein the main controlling device detects signalstrength for communicating with the controlled device, the maincontrolling device determines a duration of time during which the signalstrength for communicating with the controlled device is greater thanthe predetermined threshold value, and the main controlling devicetransmits information of the duration to the controlled device; thecontrolled device receives the information of the duration to determinewhether the duration is longer than the predetermined time period; whenthe duration is longer than the predetermined time period, thecontrolled device determines that the signal strength for communicatingwith the main controlling device is greater than the predeterminedthreshold value for the predetermined time period; and when the durationis not longer than the predetermined time period, the controlled devicedetermines that the signal strength for communicating with the maincontrolling device is not greater than the predetermined threshold valuefor the predetermined time period.
 2. A security management method,executed by a controlled device, and the security management methodcomprising steps of: communicating with a main controlling device forpairing; determining whether the main controlling device is successfullypaired to the controlled device; and when the main controlling device issuccessfully paired to the controlled device, executing a security mode;wherein when the main controlling device is successfully paired to thecontrolled device, the controlled device further determines whethersignal strength for communicating with the main controlling device isgreater than a predetermined threshold value for a predetermined timeperiod; and when the signal strength for communicating with the maincontrolling device is greater than the predetermined threshold value forthe predetermined time period, the controlled device executes thesecurity mode; and wherein the main controlling device detects signalstrength for communicating with the controlled device, and transmits thesignal strength for communicating with the controlled device to thecontrolled device; the controlled device receives the signal strengthfor communicating with the controlled device, determines a duration oftime during which the signal strength for communicating with thecontrolled device is greater than the predetermined threshold value, anddetermines whether the duration is longer than the predetermined timeperiod; when the duration is longer than the predetermined time period,the controlled device determines that the signal strength forcommunicating with the main controlling device is greater than thepredetermined threshold value for the predetermined time period; andwhen the duration is not longer than the predetermined time period, thecontrolled device determines that the signal strength for communicatingwith the main controlling device is not greater than the predeterminedthreshold value for the predetermined time period.
 3. The securitymanagement method as claimed in claim 2, wherein when the security modeis executed, a security management procedure is executed, and thesecurity management procedure comprises steps of: determining whether anapplication or a webpage contains at least one field to be filled in;and when the application or the webpage contains the at least one fieldto be filled in, transmitting a notification information to the maincontrolling device.
 4. The security management method as claimed inclaim 3, wherein the security management procedure further comprisessteps of: determining whether data filled in the at least one field iscorrect; when the data filled in the at least one field is correct,transmitting correct reminder information to the main controllingdevice; and when the data filled in the at least one field is incorrect,transmitting wrong reminder information to the main controlling device.5. A controlled device, communicating with a main controlling device forpairing, wherein when the controlled device is successfully paired tothe main controlling device, the controlled device executes a securitymode; wherein: when the main controlling device is successfully pairedto the controlled device, the controlled device further determineswhether signal strength for communicating with the main controllingdevice is greater than a predetermined threshold value for apredetermined time period; when the signal strength for communicatingwith the main controlling device is greater than the predeterminedthreshold value for the predetermined time period, the controlled deviceexecutes the security mode; and wherein the main controlling devicedetects signal strength for communicating with the controlled device,the main controlling device determines a duration of time during whichthe signal strength for communicating with the controlled device isgreater than the predetermined threshold value, and the main controllingdevice transmits information of the duration to the controlled device;the controlled device receives the information of the duration todetermine whether the duration is longer than the predetermined timeperiod; when the duration is longer than the predetermined time period,the controlled device determines that the signal strength forcommunicating with the main controlling device is greater than thepredetermined threshold value for the predetermined time period; andwhen the duration is not longer than the predetermined time period, thecontrolled device determines that the signal strength for communicatingwith the main controlling device is not greater than the predeterminedthreshold value for the predetermined time period.
 6. A controlleddevice, communicating with a main controlling device for pairing;wherein when the controlled device is successfully paired to the maincontrolling device, the controlled device executes a security mode, andwherein the main controlling device detects signal strength forcommunicating with the controlled device, and transmits the signalstrength for communicating with the controlled device to the controlleddevice; the controlled device receives the signal strength forcommunicating with the controlled device, determines a duration of timeduring which the signal strength for communicating with the controlleddevice is greater than a predetermined threshold value, and determineswhether the duration is longer than a predetermined time period; whenthe duration is longer than the predetermined time period, thecontrolled device determines that the signal strength for communicatingwith the main controlling device is greater than the predeterminedthreshold value for the predetermined time period; and when the durationis not longer than the predetermined time period, the controlled devicedetermines that the signal strength for communicating with the maincontrolling device is not greater than the predetermined threshold valuefor the predetermined time period.
 7. A security management system,comprising: a main controlling device; and a controlled device,communicating with the main controlling device for pairing; wherein whenthe controlled device is successfully paired to the main controllingdevice, the controlled device executes a security model; wherein: whenthe main controlling device is successfully paired to the controlleddevice, the controlled device further determines whether signal strengthfor communicating with the main controlling device is greater than apredetermined threshold value for a predetermined time period; and whenthe signal strength for communicating with the main controlling deviceis greater than the predetermined threshold value for the predeterminedtime period, the controlled device executes the security mode; andwherein the main controlling device detects signal strength forcommunicating with the controlled device, the main controlling devicedetermines a duration of time during which the signal strength forcommunicating with the controlled device is greater than thepredetermined threshold value, and the main controlling device transmitsinformation of the duration to the controlled device; the controlleddevice receives the information of the duration to determine whether theduration is longer than the predetermined time period; when the durationis longer than the predetermined time period, the controlled devicedetermines that the signal strength for communicating with the maincontrolling device is greater than the predetermined threshold value forthe predetermined time period; and when the duration is not longer thanthe predetermined time period, the controlled device determines that thesignal strength for communicating with the main controlling device isnot greater than the predetermined threshold value for the predeterminedtime period.
 8. A security management system, comprising: a maincontrolling device; and a controlled device, communicating with the maincontrolling device for pairing; wherein when the controlled device issuccessfully paired to the main controlling device, the controlleddevice executes a security model; wherein: when the main controllingdevice is successfully paired to the controlled device, the controlleddevice further determines whether signal strength for communicating withthe main controlling device is greater than a predetermined thresholdvalue for a predetermined time period; and when the signal strength forcommunicating with the main controlling device is greater than thepredetermined threshold value for the predetermined time period, thecontrolled device executes the security mode; and wherein the maincontrolling device detects signal strength for communicating with thecontrolled device, and transmits the signal strength for communicatingwith the controlled device to the controlled device; the controlleddevice receives the signal strength for communicating with thecontrolled device, determines a duration of time during which the signalstrength for communicating with the controlled device is greater thanthe predetermined threshold value, and determines whether the durationis longer than the predetermined time period; when the duration islonger than the predetermined time period, the controlled devicedetermines that the signal strength for communicating with the maincontrolling device is greater than the predetermined threshold value forthe predetermined time period; and when the duration is not longer thanthe predetermined time period, the controlled device determines that thesignal strength for communicating with the main controlling device isnot greater than the predetermined threshold value for the predeterminedtime period.
 9. The security management system as claimed in claim 8,further comprising: a key device; wherein the controlled devicedetermines whether the key device is electrically connected before thecontrolled device communicates with the main controlling device forpairing; when the key device is electrically connected, the controlleddevice directly executes the security mode; and when the key device isnot electrically connected, the controlled device communicates with themain controlling device for pairing.
 10. The security management systemas claimed in claim 8, wherein when the security mode is executed, apredetermined application is allowed to be executed, a predetermined webbrowser is allowed to browse a predetermined webpage, or a predeterminedapplication is allowed to execute a predetermined data file.
 11. Thesecurity management system as claimed in claim 8, wherein when thesecurity mode is executed, a security management procedure is executedby the controlled device, and the security management procedurecomprises steps of: determining whether an application or a webpagecontains at least one field to be filled in; when the application or thewebpage contains the at least one field to be filled in, transmitting anotification information to the main controlling device.
 12. A securitymanagement system, comprising: a main controlling device; and acontrolled device, communicating with the main controlling device forpairing; wherein when the controlled device is successfully paired tothe main controlling device, the controlled device executes a securitymode; and wherein when the main controlling device receives permissionconfirmation information from the controlled device, the maincontrolling device determines whether to produce permission information;when the main controlling device produces the permission information,the main controlling device further determines automatic fillinginformation is stored in the main controlling device; when the maincontrolling device determines that the main controlling device storesthe automatic filling information, the main controlling device transmitsthe permission information and the automatic filling information to thecontrolled device.
 13. The security management system as claimed inclaim 12, wherein the permission confirmation information transmitted bythe controlled device comprises field information; when the maincontrolling device determines that the main controlling device does notstore the automatic filling information, the main controlling devicetransforms the field information to an automatic filling field, and themain controlling device displays the automatic filling field; the maincontrolling device further produces the automatic filling informationaccording to an operation of a user; the main controlling device storesthe automatic filling information, and the main controlling devicetransmits the permission information and the automatic fillinginformation to the controlled device.
 14. The security management systemas claimed in claim 12, wherein: the main controlling device determineswhether an application opening instruction is generated; when the maincontrolling device determines that the application opening instructionis generated, the main controlling device transmits an applicationexecuting instruction and the automatic filling information to thecontrolled device; when the controlled device receives the applicationexecuting instruction and the automatic filling information, thecontrolled device executes a predetermined application, and inputs datain at least one field of the predetermined application according to theautomatic filling information.