Computer system having an identification device

ABSTRACT

A computer system includes an identification device and a host. The identification device includes a first wireless module for receiving a radio identification signal and then emitting a radio user signal with an identification code. The host includes a processing module for controlling operation of the host, a second wireless module for emitting the radio identified signal and receiving the user signal, a power supply for supplying power to the processing module while receiving a power control signal, and a control module electrically connected to the power supply. Before the power supply supplies power to the processing module, the control module checks whether the identification code within the user signal matches a predetermined identification code as the second wireless module receives the user signal. If the identification code within the user signal matches the predetermined identification code, the control module can transmit the power control signal to the power supply.

CROSS REFERENCE TO RELATED APPLICATIONS

This is a division of U.S. patent application Ser. No. 10/708,903 filedon Mar. 31, 2004 and claims the benefit of priority of Taiwanapplication number 092107819 filed on Apr. 4, 2003, now Taiwan PatentNo. 1238936 issued Sep. 1, 2005.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to a computer system, and morespecifically, to a computer system having a controllable host based on auser signal emitted by an identification device.

2. Description of the Prior Art

Due to advances in computer technology, a computer system is used toquickly swap and process various graphical, text data information, andenhance the effectiveness and enjoyment of work and life. Recently, theoperating speed of the computer has increased along with the developmentof the central processing unit (CPU). As the operating speed of the CPUsurpasses the frequency of a giga-hertz (GHz), the amount of data thatthe CPU can handle also increases significantly. The amount of date thatthe CPU is capable of processing per second is also substantiallyincreasing as the power consumption is also going up. Therefore, variousways, such as monitoring the status of the display, monitoring theoperation of the hard disk, and entering a sleep mode when the computeris idle for a default period, for reducing power consumption or formaking the battery running longer are utilized. In a conventionalcomputer, power consumption generated by the CPU takes a great part ofthe whole computer. As a result, the way in which the CPU is operated atlower frequencies when the user does not manipulate the computer is ausual strategy for power saving.

Additionally, users almost always run their computers for a long time.Sometimes users may temporarily logout or lock their computer to keepthe computer from being used because in some condition users have totemporarily leave. In this way, users have to manually change, whichcauses more trouble.

Please refer to FIG. 1, which shows a functional block diagram of acomputer system 10 according to the prior art. The computer system 10comprises a CPU 12, a north bridge (NB) chipset 14, a south bridge (SB)chipset 16, a volatile memory 18, a basic input output system 20, apower supply 22, a display device 24, an input interface 26, a hard diskdrive (HDD) 28, and a bus 30.

The CPU 12 is used for executing the operations of the computer system10 to implement the integrated functions of the computer system 10. Thenorth bridge chipset 14 is electrically connected to the CPU 12 forhandling the data exchange between the CPU 12, and the memory 18 as aDRAM. The display device 24 is used for providing a visual image outputof the computer system 10. The south bridge chipset 16, electricallyconnected to the north bridge chipset 14, is used for data-exchangingwith the CPU 12 by way of the north bridge chipset 14, for example,data-exchange between the input interface 26, the HDD 28 and the CPU 12.The bus 30 is used as a connection path among the south bridge chipset16, the HDD 28, the BIOS 20, the input interface 26 and other peripheraldevices. The power supply 22 is used for supplying required power to theelements of the computer system 10 such as the north bridge chipset 16,the CPU 12, and so on (for clarity, only a connection between the powersupply 22 and the CPU 12 is shown in FIG. 1). The HDD 28 is used forstoring an operating system (OS) 32 and application program 34. Theinput interface 26 includes a keyboard, a mouse, and so on.

While the computer system 10 starts running, the power supply device 22starts supplying power to the north bridge chipset 14, the south bridgechipset 16, the CPU 12, the HDD 28, and memory 18. Later on, the BIOS 20is loaded into the memory 18 and implements a power on self test (POST)procedure, and the OS 32 stored in the HDD 28 is then loaded to thememory 18. Before performing the application program 34 stored in theHDD 28, the CPU 12 will generate a command to access data on the HDD 28.The data from the HDD 28 will then be transmitted through the southbridge chipset 16 to the north bridge chipset 14. Afterwards, the northbridge chipset 14 transmits the data from the HDD 28 to the memory 18for storage. Thus, the CPU 12 can access the data from the HDD 28 in thememory 18 through the north bridge chipset 14 and temporarily store thedata in flash memory of the CPU 12 (not shown) for carrying on theadditional operations.

When users stop inputting any data for a default period, the displaydevice 24 of the computer system 10 will enter a save power mode. If theuser's eyesight does not move from the display device 24, and just stopinputting data for such default period, the computer system 10 will alsoenter save power mode, causing the user's work to be interrupted.Generally speaking, most ways of setting the save power mode is managedby a power management program which is implemented by the BIOS 20 or theOS 32.

According to the advanced configuration and power interface (ACPI), thedevices connected to an integrated device electronics (IDE) have toresponse to the computer system 10 based on its operating modes such asan idle mode, a standby mode, or a sleep mode. Therefore, if intendingto re-enable the computer system 10, triggering the input interface 26is necessary. If the user has to focus on the display device 24 withoutany input for a long time, he should turn off the function for savingmode, lest sudden interruption of his work. However, short defaultperiod arrangement results in frequently switching to the save mode, buta long default period arrangement results in a worse save power effect.

SUMMARY OF THE INVENTION

It is therefore a primary objective of the claimed invention to providea computer system comprising an identification device and a host. Thehost is capable of detecting a radio user signal broadcasted by theidentification device to control its operation for power saving, tosolve the aforementioned problem.

According to the claimed invention, a computer system includes anidentification device and a host. The identification device includes afirst wireless module for receiving a radio identification signal andthen emitting a radio user signal with an identification code. The hostincludes a processing module for controlling operation of the host, asecond wireless module for emitting the radio identified signal and forreceiving the user signal, a power supply for supplying power to theprocessing module while receiving a power control signal, and a controlmodule electrically connected to the power supply. Before the powersupply supplies power to the processing module, the control module iscapable of checking whether the identification code within the usersignal matches a predetermined identification code as the secondwireless module receives the user signal. If the identification codewithin the user signal matches the predetermined identification code,the control module is capable of transmitting the power control signalto the power supply.

Another objective of the claimed invention is to provide a computersystem having an identification device and a host. The identificationdevice includes a first wireless module for receiving a radioidentification signal and then emitting a radio user signal with anidentification code. The host includes an input interface, a secondwireless module, a control module, and a processing module. The inputinterface is used for generating an input signal. The second wirelessmodule is used for receiving the radio user signal. The control moduleis used for providing an access control signal when no user signal isreceived by the second wireless module, and for checking whether theidentification code within the user signal matches a predeterminedidentification code as the second wireless module receives the usersignal. If the identification code within the user signal matches thepredetermined identification code, the control module is capable ofgenerating an access allowable signal. The processing module is used forperforming an application program for controlling the operation of thecomputer system based on the input signal provided by the inputinterface. While performing the application program, if the accesscontrol signal is received, the processing module stops the inputinterface to control the status of the application program based on theinput signal from the input interface. If the processing module receivesthe access allowable signal from the control module, the processingmodule recovers the input interface to control the status of theapplication program based on the input signal from the input interface.

Another objective of the claimed invention is to provide a computersystem having an identification device and a host. The identificationdevice includes a first wireless module for receiving a radioidentification signal and then emitting a radio user signal with anidentification code. The host includes a second wireless module and aprocessing module. The second wireless module is used for receiving theradio user signal. The processing module is used for performing anaccess subprogram for controlling the operation of the computer system.When performing the access subprogram, the processing module is capableof checking whether the identification code of the radio user signalreceived by the second wireless module matches a predeterminedidentification code. If the identification code matches thepredetermined identification code, the processing module continues toperform an application program corresponding to the access subprogram.If not, the processing module stops performing the application program.

It is an advantage of the claimed invention that the required power issupplied by the power supply after detecting the user signal.

It is a further advantage of the claimed invention that controlling thehost of the computer system for saving power is performed by detectingthe user signal.

It is a further advantage of the claimed invention that controlling theapplication program executed by the host is performed by detecting theuser signal.

These and other objectives of the present invention will no doubt becomeobvious to those of ordinary skill in the art after reading thefollowing detailed description of the preferred embodiment that isillustrated in the various figures and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional block diagram of a computer system according tothe prior art.

FIG. 2 is a block diagram of a computer system according to the presentinvention.

FIG. 3 is a block diagram of another preferred embodiment computersystem according to the present invention.

DETAILED DESCRIPTION

Please refer to FIG. 2, which is a block diagram of a computer system 40according to the present invention. The computer system 40 comprises anidentification device 41 and a host 60. The identification device 41comprises a first wireless module 42 for receiving, a battery 44, aninput port 46 and a storage device 48.

The first wireless module 42 is used for receiving a radioidentification signal and thus for emitting a radio user signal whichcontains an identification code 50. The battery 44 supplies power forthe identification device 41. The input port 46 is used for receivingelectrical data signals. The storage device 48 is used for storing thereceived electrical data signals.

The host 60 comprises a processing module 62, a second wireless module64, a control module 66, a power supply 68, a basic input output system(BIOS) 70, an input interface 72, a memory 76, a hard disk drive (HDD)78 and a display device 80.

The processing module 62 is used for controlling the operation of thehost 60. The processing module 62 comprises a central processor unit(CPU) 90, a north bridge chipset 92 and a south bridge chipset 94. TheCPU 90 is used for integrating the operation of the host 60 of thecomputer system 40. The north bridge chipset 92, electrically connectedto the CPU 90, is used to deal data exchange between the CPU 90 and thememory 76. The south bridge chipset 94, electrically connected with thenorth bridge chipset 92, is used for data exchanging with the CPU 90 byway of the north bridge chipset 92. The second wireless module 64 isused for emitting the radio identification signal, and receiving theradio user signal. The power supply 68 is used to supply power to theprocessing module 62, after receiving a power control signal, so thatthe processing module 62 can start functioning. The control module 66,electrically connected with the power supply 68, comprises a storagedevice 74 which is used for storing a predetermined code 65. The inputinterface 72 is used for generating an input signal based on the user'scommand. The memory 76 is used for temporarily storing data and program,the HDD 78 is used for storing data and programs. In the preferredembodiment, the identification device 41 can be made to be very light,so that the user can carry it around easily.

When the host 60 is power-off, the second wireless module 64 will emitthe radio identification signal in a period of time. After receiving theradio identification signal, the identification device 41 will send anidentification code 50 stored in the storage device 48 to the firstwireless module 42 for encoding it into a user signal. Finally, theencoded user signal is emitted by the first wireless module 42. Afterdetecting the emitted user signal, the second wireless module 64 of thehost 60 decodes the user signal to the identification code 50 and sendsit to the control module 66. Then, the control module 66 will comparethe identification code 50 with a predetermined identification code 65stored in the storage device 74. If the identification code 50 matchesthe predetermined identification code 65, the control module 66generates a power control signal and then sends the power control signalto the power supply 68.

After receiving the power control signal, the power supply 48 startsproviding power to the processing module 62, so that the processingmodule 62 can start functioning.

In other words, when the host 60 is powered-off and the user who carriesthe identification device 41 gets close to the host 60, the firstwireless module 42 of the identification device 41 and the secondwireless module 64 of the host 60 automatically establish a wirelessconnection, which is capable of identifying whether the owner of theidentification device 41 is an authorized user for the host 60 bychecking whether the identification code 50 and the predeterminedidentification code 65 are matched.

In this way, one who wants to use the host 60 only carries theidentification device 41 close to the host 60, if the identificationcode 50 and the predetermined code 65 are matched, the control module 66automatically powers-on the host 60. The user does not manually inputidentification code any more.

Please keep on referring to FIG. 2. When the power supply 68 startsapplying power to the processing module 62, other devices such as thememory 76, the input interface 72, and the display device 80 are alsoswitched on. The BIOS 70 will execute a power on self test (POST) fortesting the memory 76 and the processing module 62, and then for loadingan operating system (OS) stored in the HDD 78 into the memory 76 afterfinishing booting procedure. Afterwards, a first application program 73stored in the HDD 78 can be opened and executed. The user can manipulatethe first application program 73 by means of the input interface 72.

After boot up, the first wireless module 42 of the identification device41 still encodes the identification code 50 within the storage device 48into a user signal, and emits the user signal in a predetermined period.At this moment, the second wireless module 64 of the host 60 keeps ondetecting the user signal. If the second wireless module 64 does notdetect the user signal, the control module 66 generates an accesscontrol signal to the processing module 62. After receiving the accesscontrol signal, the operational status of the first application program73 fails to be manipulated by the input interface 72. When the secondwireless module 64 detects the emitted user signal, the user signal isdecoded to the identification code 50. If the identification code 50 andthe predetermined code 65 are matched, the control module 66 generatesan access permission signal to the processing module 62. After receivingaccess permission signal, the status of the first application program 73can be manipulated again by the input interface 72. For example, whenthe user temporarily carries the identification device 41 away from thehost 60, the second wireless module 64 can not detect the user signal,so that the control module 66 sends the access control signal to theprocess module 62, causing the host 60 to be locked and the inputinterface 72 to fail to manipulating the first application program 73.After that, others are not allowed to unlock the host 60 by using theinput interface 72 because other identification codes are not matchedwith the predetermined identification code 65. Therefore, the inputinterface 72 fails to recover manipulation for the first applicationprogram 73. When the second wireless module 64 detects the user signal,and the identification code 50 and the predetermined identification code65 are matched, the host 60 will unlock. At this moment, the inputinterface 72 takes over the manipulation for the first applicationprogram 73.

In other words, when the user takes the identification device 41 away,the host 60 can switch its operation mode based on whether the usersignal of the identification device 41 is received. The host 60 not onlyautomatically enters the power save mode (like suspend to ram or suspendto disk), but also the lock status, which causes others that arenon-authorized to fail to use the host 60. When the user with theidentification device 41 gets close to the host 60, the host 60 canautomatically switch back to normal mode, so that the user with theidentification device 41 can keep on working by means of the host 60.

Please refer to FIG. 3. FIG. 3 is another preferred embodiment accordingto the present invention. For simplicity, elements that have the samefunction as that illustrated in FIG. 2 are provided the same itemnumbers used in FIG. 3.

While executed a second application program 82, an access subprogram isexecuted for ensuring the identification of the user, and the user hasto input associated information for verifying his identity. To do so,the processing module 62 can compare the received identification code 50and the predetermined code 65. If both of them are matched, theprocessing module 62 starts to perform the second application program82. If not, the second application program 82 is suspended. For example,suppose the user intends to run the second application program 82 (likea web browser) to do online trading. An API access subprogram (such as alogin program) 84 is performed prior to the second application program82 for identifying an account and a password for the login user. In themeanwhile, while the access subprogram 84 is run, the processing module62 sends a request signal via the second wireless module 64. Afterreceiving the request signal, the identification device 41 encodes theidentification code 50 into a user signal and then sends it back via thefirst wireless module 42. Afterwards, the second wireless module 64receives the user signal and sends it to the processing module 62. Theprocess module 62 can compare the identification code 50 from the firstwireless module 42 and the predetermined identification code 65. If bothare matched, that means identification and authorization for the userare confirmed. In this way, the second application program 82 is capableof being executed subsequent to the access subprogram 84.

Please notice that the preferred embodiment identification device 41 canstore various identification codes corresponding to differentapplication programs in the storage device 48. For example, if the userhas different user IDs and passwords for different websites, theidentification device of this embodiment can function. In other words,the identification device 41 can store or automatically provideidentification codes for controlling power-on, lock and unlock statusfor the host 60, and for identifying user's authorization for variousapplication programs, such as accounts in various banks andcorresponding passwords. The user does not remember many accounts orpasswords with complex digits or texts, preventing the user fromforgetting those accounts or passwords, or from leaking them out as theyare keyed in.

To sum up, the present invention techniques for memorizing andautomatically providing required identification data is described asfollow. In the illustrative embodiment, the processing module 62 canexecute a driver cooperating with the control module 66, which is usedfor watching execution of each application program in the processingmodule 62. For example, when a user uses a web browser to read a websitein need of examining identification for the login user, an accessprogram is performed prior to reading the website for keying inassociated identification data, such as his personal ID and a password.

While detecting the execution of the access subprogram, the processmodule 62 automatically keys in identification material. For the presentbrowser, when the user login the website for the first time, the browsercould query the user if the user wants the identification data to bememorized. Similarly, the present invention computer system can also askthe user if the user wants the identification data to be memorized inidentification device 41 when the user keys in the first time. If theuser agrees, the associated identification data (and associated data asto the website) are stored in the identification device 41 through thesecond wireless module 64 and the first wireless module 42. The nexttime the user needs to browse the same website, the identification datastored in the identification device 41 is capable of being automaticallyused for login through the second wireless module 64 and the firstwireless module 42.

In the illustrative embodiment, the identification code 50 and thepredetermined identification code 65 can be the ID for theidentification device 41, or inputted password depending on user'sdesire. In addition, the user can modify the predeterminedidentification code 65 by means of the input interface 72, andwirelessly modify the identification code 50 through the second wirelessdevice 64.

In other words, the user can change the predetermined identificationcode 65 stored in the host 60 as well as its correspondingidentification code 50 stored in the identification device 41, toimprove security. Besides, the storage device 48 of the identificationdevice 41 can store radio signals from the first wireless module 42 orsignals from the input port 46 in connection with the host 60.Therefore, the storage device 48 of the identification device 41 can notonly store the identification code, but also personal desired data, nomatter if these data are from the input port 46 in connection with thehost 60 or from the first wireless module 42. In this way, theidentification module 41 can not only be a personal uniqueidentification tool, but also a personal memory tool that can be carryaround. In addition, the input port 46 can be used as a plug fortransmitting power for the identification device 41 or used to chargethe battery 44.

Notice that the radio user signal emitted by the identification device41 complies with Bluetooth communication protocol or 802.11xcommunication protocol.

Compared to prior art, the host of the computer system is capable ofsupplying required power to the host while detecting the radio usersignal sent out by the identification device, and is also capable ofcontrolling the operation of the host for power saving or for secret. Inaddition, detecting the identification code can replace the conventionalway of logging in to a website manually, relieving users from memorizingmany passwords.

Those skilled in the art will readily observe that numerousmodifications and alterations of the device and method may be made whileretaining the teachings of the invention. Accordingly, the abovedisclosure should be construed as limited only by the metes and boundsof the appended claims.

1. A computer system comprising: an identification device comprising: afirst wireless module for receiving a radio identification signal andthen emitting a radio user signal with an identification code; and ahost comprising: an input interface for generating an input signal; asecond wireless module for receiving the radio user signal; a controlmodule for providing an access control signal when no user signal isreceived by the second wireless module, and for checking whether theidentification code within the user signal matches a predeterminedidentification code as the second wireless module receives the usersignal; if the identification code within the user signal matches thepredetermined identification code, the control module is capable ofgenerating an access allowable signal; and a processing module forperforming an application program for controlling the operation of thecomputer system based on the input signal provided by the inputinterface; while performing the application program, if receiving theaccess control signal, the processing module stops the input interfaceto control the status of the application program based on the inputsignal from the input interface, if the processing module receives theaccess allowable signal from the control module, the processing modulerecovers the input interface to control the status of the applicationprogram based on the input signal from the input interface.
 2. Thecomputer system of claim 1 wherein the identification device comprises abattery for supplying power to the identification device.
 3. Thecomputer system of claim 1 wherein the identification device furthercomprises a memory for storing the identification code.
 4. The computersystem of claim 3 wherein the first wireless module is also capable ofgenerating a corresponding electrical data signal while receiving aradio data signal, and the memory is capable of storing the electricaldata signal.
 5. The computer system of claim 3 wherein theidentification device further comprises an input port for receiving anelectrical data signal, and the memory is capable of storing theelectrical data signal received by the input port.
 6. The computersystem of claim 5 wherein the input port is capable of being used toprovide required power of the identification device or to charge thebattery.
 7. The computer system of claim 1 wherein the identificationcode is the ID of the identification device or a password.
 8. Thecomputer system of claim 1 wherein the predetermined identification codeis capable of being modified through the use of the input interface, andthe identification code stored in the identification device is capableof being modified in a wireless way via the second wireless module ofthe host.
 9. The computer system of claim 1 wherein the identificationdevice regularly emits the user signal via the first wireless modulewith a predetermined period, and the host receives the user signal viathe second wireless module based on the predetermined period todetermine the location of the identification device.
 10. The computersystem of claim 9 wherein the user signal emitted from theidentification device complies with a bluetooth communication protocol.11. The computer system of claim 9 wherein the user signal emitted fromthe identification device complies with an 802.11x communicationprotocol.
 12. A computer system comprising: an identification devicecomprising: a first wireless module for receiving a radio identificationsignal and then emitting a radio user signal with an identificationcode; and a host comprising: a second wireless module for receiving theradio user signal; and a processing module for performing an accesssubprogram for controlling the operation of the computer system; whenperforming the access subprogram, the processing module is capable ofchecking whether the identification code of the radio user signalreceived by the second wireless module matches a predeterminedidentification code; if the identification code matches thepredetermined identification code, the processing module continues toperform an application program corresponding to the access subprogram;if not, the processing module stops performing the application program.13. The computer system of claim 12 wherein the identification devicecomprises a battery for supplying power to the identification device.14. The computer system of claim 12 wherein the identification devicefurther comprises a memory for storing the identification code.
 15. Thecomputer system of claim 14 wherein the first wireless module is alsocapable of generating a corresponding electrical data signal whilereceiving a radio data signal, and the memory is capable of storing theelectrical data signal.
 16. The computer system of claim 14 wherein theidentification device further comprises an input port for receiving anelectrical data signal, and the memory is capable of storing theelectrical data signal received by the input port.
 17. The computersystem of claim 16 wherein the input port is capable of being used toprovide required power of the identification device or to charge thebattery.
 18. The computer system of claim 12 wherein the Iidentification code is the ID of the identification device or apassword.
 19. The computer system of claim 12 wherein the host furthercomprises an input interface for receiving input data; the predeterminedidentification code is capable of being modified through the use of theinput interface, and the identification code stored in theidentification device is capable of being modified in a wireless way viathe second wireless module of the host.
 20. The computer system of claim12 wherein the identification device regularly emits the user signal viathe first wireless module with a predetermined period, and the hostreceives the user signal via the second wireless module based on thepredetermined period to determine the location of the identificationdevice.
 21. The computer system of claim 20 wherein the user signalemitted from the identification device complies with a bluetoothcommunication protocol.
 22. The computer system of claim 20 wherein theuser signal emitted from the identification device complies with an802.11x communication protocol.