Method for automatically verifying security code of computer system operated by remote controller

ABSTRACT

A computer system includes a remote controller for generating a remote control signal to remotely control operations of the system, a remote control signal receiver for receiving the remote control signal generated from the remote controller, and a shell program for executing various remote control operations by the remote controller. If a security code verification operation is performed when the computer system returns from a stand-by state to a normal state by the remote controller, the shell program serves to automatically input a security code transmitted from the remote controller. This makes it possible to automatically input a security code that a user must directly input using an input device such as a keyboard, when the computer system returns to the normal state. Therefore, user convenience can be enhanced.

This application makes reference to, incorporates the same herein, andclaims all benefits accruing under 35 U.S.C. §119 from my applicationentitled AN AUTOMATIC SECURITY CODE VERIFYING METHOD OF A COMPUTERSYSTEM OPERATED BY A REMOTE CONTROLLER filed with the Korean IndustrialProperty Office on Mar. 2, 2000 and there duly assigned Serial No.2000-10443.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention generally relates to a computer system. Morespecifically, the present invention is directed to a method forautomatically verifying a security code of a computer system that isoperated by a remote controller.

2. Background of the Invention

A remote controller has widely been used to control operations ofvarious electronic products such as a television, an audio playersystem, and a video player system. Recently, the remote controller hasbeen used to remotely control operations of a computer system forachieving more expedient user interface.

A recent computer system has a power-saving characteristic, whichselectively switches off a main power supplied to a specific componentwhen the system is in an idle state. A conventional power managementcircuit monitors a keyboard, a mouse, and other system components as asign of activity. If no activity is found in the system components for apredetermined time, the power management circuit turns off a main supplypower, enabling the system to enter a stand-by mode. As a supply powerin the stand-by mode, a stand-by power of a low current is supplied to astand-by power logic circuit. The stand-by power logic circuit serves toenable the system to exit from the stand-by mode in response to awake-up activity. A specification associated with the power managementof the foregoing computer system is disclosed in “Advanced Configurationand Power Interface (ACPI) Specification”, Intel, Microsoft, andToshiba, published on Dec. 22, 1996.

In general, users would set a security code in their computer systems soas to save a power or achieve security. For example, there is a functionto verify a security code when the computer system returns from a screensaver state or a power saving mode to a use environment. When a computersystem is switched from a stand-by state such as a sleep state to awake-up state without setting a security code therein, the computersystem would meet a problem in a security-needful place. To overcomesuch a problem on security, operating system (OS) programs such asMicrosoft Windows 95 or Windows 98 provide a function to verify asecurity code when a computer system exits from a stand-by state.

However, if the verify function is performed when the computer system iswoke up from the stand-by state, a user must directly input a securitycode through a keyboard. Even if a remote controller for an expedientuser interface is provided, the above controller is inconvenient for theuser unless a device/method specifically modified in circuitry/softwarewould be provided in the computer system. So to speak, an advantage ofthe remote controller for controlling the computer system moreconveniently is reduced. In this case, it is impossible to entirely andremotely control the computer system using the remote controller.Therefore, a method of verifying a security code more conveniently isneeded when a computer system having a security verify function iscontrolled by a remote controller.

SUMMARY OF THE INVENTION

It is an object of the present invention is to provide a method of moreconveniently verifying a security code of a computer system whoseoperations are controlled by a remoter controller.

It is also an object to provide a method of verifying a security code orpassword of a computer whose operations are controlled by any one of aplurality of remote controllers.

It is further an object of the present invention to provide a computerthat can receive a password or a security code from a wireless remotecontrol when going from a stand-by state to a normal mode of operation.

It is yet an object of the present invention to provide a computer thathas many remote controls from which the computer can accept a passwordor a security code in order to bring the computer from a stand-by stateto a normal mode of operation.

To achieve the above and other objects of the invention, there isprovided a method and apparatus of verifying a security code set in acomputer system whose operations are controlled by a remoter controller.Security code verify initiation data is generated to initiate a functionto verify the set security code therein. When a security code is inputto a security verification means, it is checked whether the set securitycode and the input security code are matched with each other. Ifmatched, an operation state of the computer system is converted into anormal state. When the initiation data is generated by the remotecontroller, a shell program automatically inputs the input security codeto the security verification means.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete appreciation of the invention, and many of the attendantadvantages thereof, will be readily apparent as the same becomes betterunderstood by reference to the following detailed description whenconsidered in conjunction with the accompanying drawings in which likereference symbols indicate the same or similar components, wherein:

FIG. 1 is a perspective view showing an appearance of a computer systemhaving a remoter controller in accordance with a first embodiment of thepresent invention.

FIG. 2 is a block diagram showing a circuit construction of a computersystem including a remote controller and a remote control signalreceiver shown in FIG. 1.

FIG. 3 schematically shows a circuit construction of the remotercontroller shown in FIG. 2.

FIG. 4 schematically shows a circuit construction of the remote controlsignal receiver shown in FIG. 2.

FIG. 5 hierarchically shows a software and hardware construction of thecomputer system shown in FIG. 2.

FIG. 6 is a state view showing transitions of power states of a computersystem with a power management function.

FIG. 7 is a flowchart showing the steps of verifying a security codewhen the computer system returns from a stand-by state to a normal statein accordance with the first embodiment of the invention.

FIG. 8 is a block diagram showing a construction of a multi-usercomputer system in accordance with a second embodiment of the presentinvention.

FIG. 9 shows a memory area of a hard disk in the multi-user computersystem shown in FIG. 8.

FIG. 10 is a flowchart showing the steps of verifying a security code ofthe multi-user computer system shown in FIG. 8.

DETAILED DESCRIPTION OF THE INVENTION

A new and improved computer system includes a remote controller togenerate a remote control signal for remotely controlling the computersystem, a remote control signal receiver to receive a remote controlsignal generated from the remote controller, and a shell program toexecute various remote control operations by means of the remotecontroller. The shell program serves to automatically input a securitycode transmitted from a remote controller, if a security verifyoperation is carried out when the computer system goes from a stand-bystate to a normal state by the remote controller. Therefore, a securitycode input operation is automatically carried out to enhance convenienceof a user.

First Embodiment

An appearance of a computer system having a remote controller is shownin FIG. 1. And, a construction of the computer system including a remotecontroller and a remote control signal receiver is schematically shownin FIG. 2.

Referring to FIG. 1 and FIG. 2, a computer system 200 can be driven by apower switch 210 of a computer, and can remotely be driven by a remotecontroller 300. In other words, a remote control signal generated fromthe remote controller 300 is transmitted to a remote control signalreceiver 400 embedded in the computer system 200, controlling operationsof the computer system 200. The receiver 400 is coupled to a generalpurpose IO (GPIO) 252 mounted in a PCI-to-ISA bridge 250 (see FIG. 5)and a shell program 293. The GPIO 252 serves to transmit stateinformation of the computer system 200 from the shell program 293 to thereceiver 400. The receiver 400 receiving the state information carriesout a power-related remote control through a power supply 280 (see FIG.5) and a system power management 251 (see FIG. 5) coupled to a powerswitch 210 (see FIG. 5).

Particularly, the remote controller 300 and the remote control signalreceiver 400 associated therewith have an identical security code forverifying an authentic user. The remote control signal generated fromthe remote controller 300 is transmitted together with the securitycode. Only when these security codes are matched with each other, thecomputer system 200 can remotely be controlled by the remote controller300.

A circuit construction of the remote controller 300 shown in FIG. 2 isschematically shown in FIG. 3. The remote controller 300 includes anEEPROM 320 for storing a security code, a microcontroller 310 forgenerating a computer remote control instruction, a remote controlsignal transmitting circuit 330 for transmitting the instruction to thereceiver 400, and a battery 340 for supplying an operating power of theremote controller 300. The microcontroller 310, which is coupled betweenthe EEPROM 320 and the transmitting circuit 330, serves to generate aremote control instruction and control sequential operations fortransmitting the instruction through the transmitting circuit 330.Microcontroller 310 is connected to ground when switch 301 is closed andbattery 340 is connected to ground when switch 302 is closed.

A circuit construction of the remote control signal receiver 400 isschematically shown in FIG. 4. The remote control signal receiver 400includes an EEPROM 420 for storing a security code, a remote controlsignal receiving circuit 430 for receiving a remote control instructionfrom a remote controller, and a microcontroller 410 coupled between theEEPROM 420 and the receiving circuit 430. The microcontroller 410receives a remote control instruction, and checks whether a securitycode of the remote controller 300 is matched with that stored in theEEPROM 420. If matched, the microcontroller 410 controls the remotecontrol instruction to be executed.

A hardware/software construction of the computer system 200 shown inFIG. 2 is hierarchically shown in FIG. 5. The computer system 200 has ahierarchical structure that is composed of a hardware layer 500, a BIOSlayer 510, an operating system layer 520, and an application layer 530.

The hardware layer 500 includes a PCI-to-ISA bridge 250, a super I/O265, and a remote control signal receiver 400. The PCI-to-ISA bridge 250is roughly composed of a system power management 251 and a GPIO 252. Apower supply 280 and a power switch 210 are commonly coupled to thesystem power management 251. A keyboard controller 266 resides in superI/O 265 in hardware layer 500.

The BIOS layer 510 includes a basic input/output system (BIOS) 260. Theoperating system 520 includes an operation system program 295 such asMicrosoft Windows 95 or Windows 98, and a virtual keyboard driver VxD290. The application layer 530 includes a shell program 293 composed ofthe VxD 290 and a launcher 292 serving to automatically execute aprogram. Functions performed by the shell program 293 are previouslystored in a specific area of the BIOS 260.

If a security code is set in a computer system for power saving orsecurity and a function to verify the security code when a computerexists from a stand-by state to a normal state is provided to thesystem, the shell program 293 directly transmits a security code, whichis transmitted from a remote controller 300, to an OS program 295. As aresult, although a user does not input the security code through akeyboard, the security code automatically inputs to carry out a securitycode verify operation.

A state view showing transitions of power states of a computer systemhaving a power management function is shown in FIG. 6. The power statesare classified into a normal state, a stand-by state, and an off state.

For example, when the computer system 200 is in the off state, if apower is applied by a remote control signal transmitted from the remotecontroller 300 or a power switch 210 mounted upon a body of the computersystem 200, the computer system 200 is booted and enters the normalstate. On the other hand, if the power is shut off by a remote controlsignal or the power switch, a power state of the computer system 200 isconverted into the off state from the normal state.

When the computer system 200 is in the normal state, if the remotecontrol signal is transmitted from the remote controller 300 to theremote control signal receiver 400, the computer system 200 enters thestand-by state. Alternatively, if data does not input from a data inputdevice such as the keyboard 100 for a predetermined time, the powerstate of the computer system 200 is converted into the stand-by statefrom the normal state by the power management function. On the otherhand, when the computer system 200 is in the stand-by state, if datainputs from one of the data input devices such as the mouse 110 or theremote controller 300, the power state thereof is converted into thenormal state from the stand-by state.

As described above, if a security code is set in a computer system and afunction to verify the security code is provided to the system inexisting from a stand-by state to a normal state, power-state transitionof the system will be performed as follows. A user password or securitycode is commonly stored in EEPROM 320 of the remote controller 300 andin EEPROM 420 of computer system 200. When a user presses a key (e.g.,power key) of the remote controller in order to bring the computer fromstand-by mode to normal mode, the security code stored in the EEPROM 320within the remote controller 300 is automatically transmitted throughthe remote control signal transmitting circuit 330 to the computersystem. Remote control receiver 400 receives the security code from theremote controller 300, checks whether or not the received code isidentical with the security code stored in its EEPROM 420, and, if so,resumes the computer system so that the computer enters the normal modefrom the stand-by mode. Like this, the computer system of the inventioncan be converted from its stand-by mode into its normal mode by use ofan authorized remote controller(s). If transition to a normal state isperformed by an input of the remote controller 300, the shell program293 directly transmits the security code verify function, which istransmitted from the remote controller 300, to the OS program 295. Thus,after performing a security code verify operation on the basis of thissecurity code, the OS program 295 returns the power state of the systemto the normal state. All operations of these sequential steps areautomatically performed by control of the shell program 293 withoutmanipulation except the remote controller 300.

If transition to the normal state is performed not by the remotecontroller 300 but by another input device, the OS program 295 displaysa message saying “input a security code” on a screen of a monitor 120.In this case, a user directly inputs a security code using the keyboard100. Then the OS program 295 checks whether the input security code ismatched with the preset security code. If matched, the power statereturns to the normal state.

When a power state of a computer system returns from a stand-by state toa normal state, a security code verify operation flow is illustrated inFIG. 7. In step S100, it is checked whether data is input within apredetermined time. If data is not input, step S100 proceeds to stepS100 wherein a screen save function that an OS program supports isperformed.

In step S120, it is checked once again whether data is input within apredetermined time. If data is not input, step S120 proceeds to stepS130 wherein the power state is converted into a stand-by state. If datais input, step S120 proceeds to step S150 wherein it is checked whetherthe data is input from a remote controller. If the data is input fromthe remote controller, step S150 proceeds to step S160 wherein asecurity code automatic input and verification function is performed.This is achieved by making the shell program transmit the security code,which is input from the remote controller, to the OS program. If thefunction is finished in step S160, the power state returns to the normalstate in step S200. If it is determined in step S150 that the data isnot input via the remote controller, the control passes to step S170where the display asks for input of the security code, step S180 wherethe user inputs the security code (usually via a keyboard) and step S190where the input security code is compared with an internal securitycode. If the function is finished in step S190, the power state returnsto the normal state in step S200.

After the power state of the computer system is converted into thestand-by state in step S130, step S130 proceeds to step S140 wherein itis checked once more whether the data is input within a predeterminedtime period. If the data is not input, step S140 returns to step S130wherein the power state remains in the stand-by state. If the is datainput, step S140 proceeds to step S150 wherein the foregoing step ofverifying the security code according to a type of the input device isperformed.

As described above, if the power state of the computer system isconverted into the normal state from the stand-by state by the remotecontroller, the shell program automatically inputs the security code,which is transmitted from the remote controller, to the OS program.Thus, although a user does not input a security code using a keyboard,an automatic security code verification function is performed to enablethe user to perform the steps of verifying the security code moreconveniently.

Second Embodiment

Now, a second embodiment of the present invention will be described in,for example, a multi-user computer system hereinafter. According to thesecond embodiment, a multi-user system automatically performs a securitycode verification operation when a computer system goes from a stand-bystate to a normal state by operation of a remote controller. Therefore,a security code input operation that a user must input using an inputdevice such as a keyboard is automatically performed to enhanceconvenience of the user.

A construction of a multi-user computer system according to the secondembodiment of the invention is schematically shown in FIG. 8. Amulti-user system 600 cordlessly accesses to a plurality of remotecontroller 700, 710, 720, and 730. A plurality of users can remotelycontrol the system 600 using their remote controllers 700, 710, 720, and730, respectively. The system 600 includes a remote control signalreceiver 610, a GPIO 620, and a shell program 630. Basic operations toprocess an input of a remote control signal in the computer system 600according to the second embodiment are identical to those in thecomputer system according to the first embodiment. Similar to the firstembodiment, the remote control signal receiver 610 is composed of amicrocontroller, an EEPROM, and remote control signal receivingcircuits. Each password of multi-users is stored in the EEPROM, and isused to verify a password during inputting the remote control signal. Asa difference between the first and second embodiments, a method forprocessing an input of a remote control signal that inputs from aplurality of users will now be described more fully hereinafter.

A memory area 800 of a hard disk in the multi-user computer system 600is shown in FIG. 9. The memory area 800 is classified into asave-to-disk (STD) area 810 and a generic area 820. When the system 600is in the STD, contents of a main memory are stored in the STD area 810.The STD area 810 is divided into a plurality of areas 811, 812, 813, and814 whose sizes are equal to each other. The number of the area 811,812, 813, and 814 corresponds to that of the multi-users. The genericarea 820 is a generic hard disk storage area in which an operatingsystem, application programs, data, etc. are stored.

A security code verification flow of the multi-user system 600 is shownin FIG. 10. Security code verification operations are controlled by amicrocontroller embedded in a remote control signal receiver 610. If aremote control signal is received from remote controllers 700, 710, 720,and 730, it is checked whether a password match occurs in step S300. Inother words, whether a user's password registered in the received remotecontrol signal is checked. If the received remote control is signalinput from a registered user, a system state is checked in step S310. Ifthe system state is a normal state, step S310 proceeds to step S320wherein it is checked whether the received remote control signal isinput from a current user. If the remote control signal is not inputfrom a current user, step S320 proceeds to step S330 wherein the inputof the remote control signal is ignored. If the remote control signal isinput from a current user, step S320 proceeds to step S340 wherein aprocess corresponding to the remote control signal is performed.

If the system state is in the stand-by state, step S310 proceeds to stepS350 wherein it is checked whether the input signal is coming from thecurrent user. If the input signal is coming from the current user, stepS350 proceeds to step S360 wherein the system is woke up. If the inputsignal is not coming from the current user, step S350 proceeds to stepS370 wherein a save-to-disk (STD) is performed to the current user. Instep S380, it is checked whether a remote control signal input to acomputer comes from the same remote control that booted the computer inthe first place. If the remote controls are the same, step S380 proceedsto step S390 wherein the computer is returned to normal mode fromstand-by mode. If the remote control in use is different from the oneused to boot the computer, step S380 proceeds to step S400 wherein thesystem is normally booted.

If the system is in a power-off state, step S310 proceeds directly tostep S400 wherein the system is powered on and booted. Similar to thefirst embodiment, a procedure of checking a password in steps S360,S390, and S400 automatically inputs. Therefore, a user does not have toperform a procedure of inputting a password.

As described so far, when operations are controlled by a remotecontroller in a single-user or a multi-user computer system, a method ofverifying a security code can be more simplified. And, a user does nothave to input a password in person.

The invention has been described and its operation detailed. When aperson skilled in the art reads the foregoing description, alternativesand equivalents within the spirit and intent of the invention will beapparent. Accordingly, it is intended that the scope of the invention belimited by he claims that follows.

1. A method of operating a computer, the method comprising: pressing abutton on an input device; determining whether the input device is awireless remote controller; automatically transmitting a first securitycode stored in the input device to the computer when the input device isa wireless remote controller; requiring manual input of the firstsecurity code when said input device is not a wireless remotecontroller; checking whether a second security code stored within thecomputer is the same as the first security code; and automaticallyconverting an operation mode of the computer from a non-normal,non-power off mode into a normal mode when the first security code isthe same as the second security code.
 2. The method of claim 1, whereinsaid computer comprises an operating system (OS) program to perform saidchecking step.
 3. The method of claim 1, wherein the computer is in astandby mode immediately prior to said conversion to said normal state,said standby mode being a power saving state where an amount of powerdelivered to the computer is less than normal but greater than zero,said standby mode being said non-normal, non-power off mode.
 4. Themethod of claim 1, wherein the computer is in a screen saver modeimmediately prior to said conversion to said normal mode, said screensaver mode being said non normal non power off mode.
 5. The method ofclaim 1, said automatically transmitting said first security code tosaid computer occurring when just one button has been pressed on saidwireless remote controller.
 6. The method of claim 1, the remotecontroller being a wireless hand held remote controller.
 7. A method forautomatically verifying a security code of a multi-user computer via oneof a plurality of cordless remote controllers, the method comprising thesteps of: operating a remote control device, the remote control devicebeing one of said plurality of remote controllers, to turn on and bootsaid computer; waiting a predetermined period of time for said computerto lapse into a stand-by mode; pushing a button on one of said pluralityof remote controllers to attempt to bring said computer to a normalmode; transmitting a password to said computer from said remote controldevice that attempted to bring said computer back to a normal mode;determining whether the remote controller used to attempt to bring saidcomputer to a normal mode is the same remote control device that bootedsaid computer; bringing said computer back to a normal mode if saidremote control device used to bring the computer back to a normal modeis the same remote control device used to boot the computer; andrebooting said computer and repeating all of the above steps if theremote control device used to bring said computer to a normal mode isdifferent from the remote control device used to boot the computer. 8.The method of claim 7, further comprising the steps of: transmitting tosaid computer from said one of said plurality of remote controllers apassword unique to said remote controller when said computer is booted;saving said password of said remote controller to disk in said computerfor future use; and comparing a password transmitted to said computer bysaid remote controller that is attempting to resume said computer to anormal mode with said password stored in said disk to determine whetherthe remote controller used to attempt to resume said computer to anormal mode is the same remote controller used to boot said computer. 9.The method of claim 8, wherein the multi-user computer includes aplurality of save-to-disk storage areas for each one of said pluralityof remote controllers.