KR101600026B1 - Method and system for restriction of user eqipment - Google Patents

Method and system for restriction of user eqipment Download PDF

Info

Publication number
KR101600026B1
KR101600026B1 KR1020150161122A KR20150161122A KR101600026B1 KR 101600026 B1 KR101600026 B1 KR 101600026B1 KR 1020150161122 A KR1020150161122 A KR 1020150161122A KR 20150161122 A KR20150161122 A KR 20150161122A KR 101600026 B1 KR101600026 B1 KR 101600026B1
Authority
KR
South Korea
Prior art keywords
user device
voice information
application
usage
restriction
Prior art date
Application number
KR1020150161122A
Other languages
Korean (ko)
Inventor
김혜경
김종한
Original Assignee
김혜경
김종한
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김혜경, 김종한 filed Critical 김혜경
Priority to KR1020150161122A priority Critical patent/KR101600026B1/en
Application granted granted Critical
Publication of KR101600026B1 publication Critical patent/KR101600026B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed are a method and a system for restricting usage of a user device. The method for restricting usage of a user device comprises the following steps: installing a first usage restriction application to a first user device; installing a second usage restriction application to a second user device; registering identification information of the second user device to the first user device based on the first and second usage restriction applications; registering usage restriction voice information and usage restriction releasing voice information generated by the voice of a user of the first user device based on the first usage restriction application to the second user device through the second usage restriction application; converting the second user device from an activation state into a lock state based on the usage restriction voice information; and converting the second user device from the lock state into the activation state based on the usage restriction releasing voice information.

Description

TECHNICAL FIELD [0001] The present invention relates to a method and system for restricting use of a user device,

The present invention relates to a user device management method and apparatus, and more particularly, to a method and system for restricting use of a user device.

According to a survey by the Korea Youth Policy Institute, 9 out of 10 youths (90.1%) own smartphones, and most students in the 6th grade of elementary school have smart phones.

The use of smartphones by young people is now becoming a culture. As the number of smartphone users becomes a majority of society, the alienation phenomenon of non-users of smartphones or the pressures and constraints on the use of mobile phones lead to the use of smartphones, and the youths are either left out of friendship To avoid this, you can use a smartphone and this may lead to over-poisoning your smartphone.

Young people 's smartphone use has many advantages in terms of information utilization. This is particularly true in terms of sharing information through social network services such as Twitter, Facebook, and KakaoTalk, and forming a wide range of human relationships. These advantages are as serious as the adverse effects on smartphones are due to the ability to access wireless Internet regardless of time and space anytime and anywhere. Especially, the problem of adolescents' addiction to smart phones is becoming a social problem.

KR 10-2014-0024204

One aspect of the invention provides a method of restricting use of a user device.

Another aspect of the invention provides a usage restriction system for a user device.

A method for restricting use of a user device in accordance with an aspect of the present invention includes the steps of installing a first usage restriction application on a first user device, installing a second usage restriction application on a second user device, And a second usage restricting application, wherein the identification information of the second user device is registered in the first user device based on the second usage restricting application, Wherein the second usage restriction device registers the use restriction voice information and the use restriction release voice information to the second user device through the second usage restriction application, And the second user equipment transmits the use restriction release voice information Wherein the first usage restriction application implements a function for the first user device to control whether to use the second user device, The second usage restricting application may implement a function for the second user device to control whether or not use is restricted by the first user device.

On the other hand, the second user device receives voice information from outside via a microphone, compares the waveform of the voice information with the waveform of the use-restricted voice information to determine whether to switch to the locked state, The apparatus can receive the voice information from the outside via the microphone and compare the waveform of the voice information with the waveform of the use-unrestricted voice information to determine whether or not to switch to the activated state.

In addition, if the location of the first user equipment and the location of the second user equipment are within a critical distance, the second usage restricting application may be automatically operated as a background application, and the threshold distance may be a delivery range of the voice signal .

In addition, if the microphone is in a blocked state, the second user device may be switched to a locked state without a comparison procedure between the waveform of the voice information and the waveform of the restricted voice information, have.

In addition, the second user equipment may determine the blocked state when the noise input through the microphone shows a rapid decrease within a predetermined time.

According to another aspect of the present invention, there is provided a use restriction system for a user device,

Wherein the first usage restricting application is installed, the identification information of the second user device is registered based on the first usage restricting application, the use limited voice information generated by the user's voice based on the first use restricting application, A first user device and a second use-restriction application, which are implemented to register the restriction-released voice information to the second user device through the second use-restriction application, are installed, The second user device being registered in the first user device and receiving the use-restricted voice information and the fraudulent-use-unrestricted voice information generated by the voice of the user of the first user device through the second use- Wherein the second user device is capable of communicating with the usage agent Wherein the first usage restriction application is switched from the active state to the locked state based on the voice information and is switched from the locked state to the activated state based on the use restriction released voice information, The second usage restriction application may implement a function for controlling whether the use of the user device is restricted or not and the second usage restriction application may implement a function for the second user device to control the usage restriction by the first user device.

On the other hand, the second user device receives voice information from outside via a microphone, compares the waveform of the voice information with the waveform of the use-restricted voice information to determine whether to switch to the locked state, The apparatus may be configured to receive the voice information from the outside via the microphone and to determine whether to switch to the activated state by comparing the waveform of the voice information with the waveform of the use-unrestricted voice information.

In addition, if the location of the first user equipment and the location of the second user equipment are within a critical distance, the second usage restricting application may be automatically operated as a background application, and the threshold distance may be a delivery range of the voice signal .

In addition, if the microphone is in a blocked state, the second user device may be switched to a locked state without a comparison procedure between the waveform of the voice information and the waveform of the restricted voice information, have.

In addition, the second user equipment may determine the blocked state when the noise input through the microphone shows a rapid decrease within a predetermined time.

The method and system for restricting the use of a user device according to an exemplary embodiment of the present invention may restrict use of the user device by a set voice signal. Thus, when usage control on a user device is required, the use of the user device can be effectively restricted.

1 is a conceptual diagram illustrating a method of managing a child's smartphone according to an embodiment of the present invention.
2 is a conceptual diagram illustrating a method for managing use of a child smartphone based on location information of a child smartphone according to an embodiment of the present invention.
3 is a conceptual diagram illustrating a basic setting method of a use restriction application for controlling a child smart phone through a parent smart phone according to an embodiment of the present invention.
4 is a conceptual diagram illustrating a method for reducing power consumption due to the operation of the usage restricting application according to the embodiment of the present invention.
5 is a conceptual diagram illustrating a method of analyzing voice information according to an embodiment of the present invention.
FIG. 6 is a conceptual diagram illustrating a usage restricting operation of the usage restricting application according to the embodiment of the present invention.
FIG. 7 is a conceptual diagram illustrating a usage restricting operation of a usage restricting application according to an embodiment of the present invention.
8 is a conceptual diagram illustrating a use restriction function for a plurality of smartphones according to an embodiment of the present invention.

The following detailed description of the invention refers to the accompanying drawings, which illustrate, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, certain features, structures, and characteristics described herein may be implemented in other embodiments without departing from the spirit and scope of the invention in connection with an embodiment. It is also to be understood that the position or arrangement of the individual components within each disclosed embodiment may be varied without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is to be limited only by the appended claims, along with the full scope of equivalents to which such claims are entitled, if properly explained. In the drawings, like reference numerals refer to the same or similar functions throughout the several views.

Hereinafter, preferred embodiments of the present invention will be described in more detail with reference to the drawings.

Hereinafter, a parental control application (master use restriction application) installed in a parent smartphone, a parental control application, a parental control application, a parental control application, The usage restricting application (slave use restricting application) installed in the smart phone can be expressed by the second usage restricting application. Hereinafter, the term smart phone is used for the convenience of explanation in the embodiments of the present invention, but the smart phone may be interpreted as various user devices (tablet, notebook, PC, etc.) used by the user.

1 is a conceptual diagram illustrating a method of managing a child's smartphone according to an embodiment of the present invention.

FIG. 1 illustrates a method of setting a use restriction on a child smart phone based on voice information received by a use restriction application implemented in a child's smart phone (hereinafter referred to as a child smart phone).

Referring to FIG. 1, a use restriction application for setting a usage restriction on a smartphone based on received voice information may be installed in a child smart phone.

Restricted use for setting use restriction of child smartphone When the voice information is inputted, the child smart phone can be switched to the locked state based on the use restriction application. If the use restriction release voice information for releasing the use restriction of the child smartphone is input again, the child smart phone can be activated again based on the use restriction application. In a locked state, the full functionality (or some functionality) of the child smartphone may be unavailable, and in its activated state, the full functionality of the child smartphone may be available.

The user can register the use-restricted voice information 100 and the unrestricted-use voice information 120 through the use restriction application installed in the child smart phone.

For example, the usage-restricted voice information may be "Do not", "Stop", "Turn off the mobile phone (or smartphone)" and the like. The use restriction release voice information can be "oo love", "okay", "password xxx", and the like.

If the use-restricted voice information 100 is input through the microphone installed in the child smartphone a predetermined number of times, the use restriction application can set the child smartphone to the locked state 150. [ For example, the use restriction application recognizes the voice inputted through the microphone of the child smartphone, and when the recognized voice information and the usage restriction voice information 100 have the same waveform, 170 to the locked state 150. [ In addition, when the use restriction application recognizes the voice input through the microphone of the child smartphone and the recognized voice information and the use-unrestricted voice information 120 have the same waveform, ) To the active state 170. [

The above settings can be used to manage (or limit) the use of your child's excessive use of the smartphone. Usage Restriction The application can also manage the child's smartphone based on the location information of the child's smartphone.

2 is a conceptual diagram illustrating a method for managing use of a child smartphone based on location information of a child smartphone according to an embodiment of the present invention.

In FIG. 2, the location information of the child smartphone is determined, and when the child smartphone is located within a certain range based on the location of the parent smartphone (hereinafter referred to as the parent smartphone) / RTI > The following location-based use restriction procedures can be performed by setting the location-based use restriction function of the use restriction application installed in the parent smartphone.

2, when the location-based use restriction is set for the child smartphone 250 in the parent smartphone 200, the child smartphone 250 located within a certain range based on the location of the parent smartphone 200, Can be set.

When the location-based use restriction setting is performed in the parent smartphone 200, the use restricting service server that serves the use restricting application can determine the location of the parent smartphone 200 and the location of the child smartphone 250 . The use restriction service server may set a usage restriction range based on the use restriction application installed on the parent smartphone 200. The use restriction service server may set the usage restriction range to a position of the parent smart phone 200 and a position of the child smart phone 250, The use restriction application installed in the child smartphone 250 may be automatically activated to switch the state of the child smartphone 250 to the locked state. When such a method is used, control over the use of the child smartphone 250 in the home can be effectively performed.

On the contrary, if the location of the parent smartphone 200 and the location of the child smartphone 250 are not within the usage restriction range, the use restriction service server drives the use restriction application installed in the child smartphone 250 to display the child smart phone 250 can be kept active.

3 is a conceptual diagram illustrating a basic setting method of a use restriction application for controlling a child smart phone through a parent smart phone according to an embodiment of the present invention.

3 shows a basic setting method of a usage restricting application for controlling a child smart phone through a parent smart phone.

3, a usage restriction application is installed in the parent smart phone 300 and the child smart phone 350, and a child smart (registered trademark) The phone 350 can be set. The usage restriction application installed in the parent smart phone 300 and the child smart phone 350 may be different applications. For example, the master use restriction application 310 may be installed in the parent smartphone 300, and the slave use restriction application 360 may be installed in the child smartphone 350. [

When the master use restriction application 310 is installed in the parent smartphone 300, the master use restriction application 310 is used to restrict the use of the child smartphone 300, which is a target smartphone, 350 may be requested to register. In this case, the identification information on the child smartphone 350 can be registered through the master use restriction application 310 installed in the parent smartphone 300, and based on the registration procedure, the parent smart phone 300 The control of the child smartphone 350 by the voice 300 can be performed.

For example, in order to control the child smartphone 350 based on the voice of the parent, the voice-based use restriction setting function may be selected on the master use restriction application 310 installed in the parent smartphone 300 . After the voice-based use restriction setting function is selected, the use-restricted voice information and the unrestricted-use voice information can be registered through the microphone of the parent smartphone 300 (or the microphone of the child's smartphone). The registered use restriction voice information and the use restriction unlocking voice information are transmitted to the child smartphone 350 and can be used for restricting use of the voice based use / use restriction of the child smart phone 350. [

For example, in order to control the child smartphone 350 based on the position of the parent smartphone 300 described above, it is possible to restrict the use of the location based on the master use restriction application 310 installed in the parent smartphone 300 The setting function can be selected. Based on the location of the parent smartphone 300 and the location of the child smartphone 350, the child smartphone 350 may be within a certain range based on the parent smartphone 300, The use of the child smartphone 350 may be restricted.

4 is a conceptual diagram illustrating a method for reducing power consumption due to the operation of the usage restricting application according to the embodiment of the present invention.

When the usage restricting application is continuously operated as a background application for receiving the use limited voice information and the use unrestricted voice information, the power consumption of the smart phone due to the operation of the use restricting application is increased and the unnecessary memory occupation of the smart phone is increased have. Therefore, there is a need for a method to reduce such power consumption and memory occupancy.

4, when the use restriction start function on the master use restriction application installed in the parent smart phone is set, the slave use restriction application of the child smart phone operates in the background, It can be determined whether or not it is the canceled voice information. That is, the operation of the slave use restriction application can be triggered by the parent smartphone.

If the start of the use restriction function on the parent use restriction application installed in the parent smartphone is not set, the slave use restriction application of the child smart phone does not operate and the judgment of the inputted voice information is not performed. The power consumption and memory occupancy of the child smartphone can be reduced.

In addition, the slave use restriction application of the child smartphone may operate in the background only when the use restriction function of the master use restriction application installed in the parent smartphone is set and the parent smartphone and the child smartphone are located within a certain distance. The distance may be an audible range where the voice of the parent can reach the child's smartphone. In other words, the use restriction information generated by the parent voice information and the usage restriction canceling restriction only when the child smartphone is located within the range where the voice information can be reached, the slave use restriction application of the child smartphone's child smartphone operates in the background, Applications can reduce power consumption and memory occupancy of smartphones.

In addition, when the use restriction function of the master use restriction application installed in the parent smartphone is set and the parent smartphone and the child smartphone are located within a certain distance and the child smartphone slave use restriction application is operated, It is possible to determine whether the input voice information is the use-restricted voice information and the unrestricted-use voice information by analyzing only a part of the voice.

5 is a conceptual diagram illustrating a method of analyzing voice information according to an embodiment of the present invention.

FIG. 5 discloses a method for determining whether or not input audio information is use-restricted audio information and use-restricted audio information.

5, when the slave use restricting application installed in the child smart phone is operated as described above, when the voice inputted through the analysis of the inputted voice information is the use limited voice information, Lt; / RTI >

Conversely, if the voice input through the analysis of the inputted voice information is the use-restriction-canceled voice information, the child smartphone may be set in the activated state.

The feature information of the input voice information in which the slave use restricting application is driven in the child smart phone can be compared with the feature information of the registered use limited voice information / use unrestricted voice information (step S500).

If the feature information of the voice information and the feature information of the registered use restricted voice information / unrestricted use disabled voice information are equal to or more than the threshold similarity rate, it is possible to analyze whether the voice information is the use restricted voice information / have. On the other hand, when the feature information of the voice information and the feature information of the registered use restricted voice information / unrestricted use disabled voice information are less than the threshold similarity rate, it is determined that the voice information is not the use limited voice information / Can be stopped.

The analysis of whether the voice information is the use-restricted voice information / the use-restriction-canceled voice information may be performed in units of syllables (step S510). For example, when the use limited voice information is "do not care", an analysis is made as to whether or not the first syllable of the inputted voice information is "that", and when the first syllable of the inputted voice information is " Analysis of syllables can be performed. If the first syllable of the input speech information is not " that ", analysis of another syllable can be discontinued.

The above analysis procedure can reduce power consumption for analysis of unnecessary child smartphones.

FIG. 6 is a conceptual diagram illustrating a usage restricting operation of the usage restricting application according to the embodiment of the present invention.

FIG. 6 discloses a method for enforcing usage restrictions on child smartphones through additional setting of a use restriction application.

If your child blocks the microphone portion of your child's smartphone, the voice of parental use restriction may not be entered into your child's smartphone.

Parental Use Restriction In order to prevent the voice from being entered into the child's smartphone, if the microphone is blocked for a certain period of time in the child's smartphone, the child's smartphone may be automatically locked. That is, it is determined whether or not the microphone is blocked on the child smartphone (step S600). If the microphone is interrupted, the lock function can be set on the child smartphone without determining the use restriction voice (step S620).

For example, if the microphone blocking restriction function is set on the master use restriction application installed on the parent smartphone and the microphone of the child smartphone is blocked for a certain time, the child can be locked on the smartphone automatically.

If the sound inputted from the child smartphone for a predetermined time or more is less than a certain decibel or the white noise is not inputted, the microphone is judged to be blocked and the lock function can be set. Or if the input noise is rapidly reduced within a predetermined dB or more, it is determined that the microphone is blocked and the lock function can be set.

FIG. 7 is a conceptual diagram illustrating a usage restricting operation of a usage restricting application according to an embodiment of the present invention.

In Fig. 7, a mission is set in the user's application, and a use restriction release procedure via the mission is started.

7, when a use restriction is set for the child smartphone 750 by the parent smartphone 700, a mission for canceling the use restriction on the child smartphone 750 through the parent smart phone 700 Function may be additionally set.

For example, when the child completes a specific mission, mission information may be provided to the child smartphone 750 via the parent smartphone 700 so that the use restriction on the child smartphone 750 is released. The mission information can be freely input through the parent smartphone 700. [

For example, after setting a usage restriction on the child smartphone 750, the parent may set a mission function such as " Wake up early " or " . In this case, a mission completion check function for the mission is set so that the mission set by the parent smartphone 700 can be displayed on the desktop of the child smartphone 750 and that the parent can check whether the mission is completed or not . The mission completion check can be performed by voice information (e.g., " mission completed ") for mission completion check registered by the parent, and when the child completes the mission, The user can confirm the success of the mission by inputting the voice information for the mission completion check and release the use restriction setting.

8 is a conceptual diagram illustrating a use restriction function for a plurality of smartphones according to an embodiment of the present invention.

In Fig. 8, a method for performing usage restrictions on a plurality of smartphones is disclosed. For example, a restriction on a plurality of smartphones owned by a plurality of students in a classroom in a class may be required, and in this case, a restriction method for a plurality of smartphones is disclosed.

Referring to FIG. 8, a plurality of smartphones may be set as one smartphone group 850. For example, a usage restricting application may be installed in each of the plurality of smart phones, and group identification information for controlling based on the smartphone group may be assigned. For example, in the classroom where 30 students are located, 30 smartphones of 30 students can be managed based on one group identification information.

This smartphone group 850 can be controlled by one master smartphone 800. The master smartphone 800 may be a smartphone of the teacher. The master smartphone 800 can perform the use restriction setting / use restriction release setting for the smartphone group 850, and the plurality of smart phones included in the smartphone group 850 can be limited in use The use restriction can be released. Hereinafter, the smartphone included in the smartphone group 850 is expressed by the term slave smartphone.

The master smartphone 800 can control the slave smartphone by the following procedure.

First, the master smartphone 800 can confirm whether or not the usage restriction application installed in the slave smartphone operates properly through the scanning procedure. There may be a smart phone whose slave smartphone has been arbitrarily deleted. Accordingly, the normal operation of the user-restricted application can be confirmed through the scanning procedure.

The master smartphone 800 may multicast a scanning signal including the group identifier to the smartphone group 850 for the scanning procedure and the slave smartphone included in the smartphone group receives the multicasted scanning signal , The normal operation confirmation message can be transmitted to the master smartphone 800 when the usage restricting application is normally operable.

The master smartphone 800 can confirm whether the usage restricting application installed in the registered slave smartphones operates properly based on the normal operation confirmation message.

The master smartphone 800 may check whether the usage restriction application installed in the slave smartphones is operating normally, and then multicast the usage restriction setting message based on the group identifier. If the master smartphone 800 wants to set a usage limit for slave smartphones for a certain period of time (e.g., a class time), the usage limit setting message sent by the master smartphone 800 may be used And time information on which the restriction is set (use restriction setting time information).

The slave smartphone receiving the usage restriction setting message including the usage restriction setting time information can set the slave smartphone to be locked for the predetermined time. If the set time limit is exceeded, the slave smartphone can be switched from the locked state to the active state again.

The use restriction setting message and the intensity of the scanning signal may be set in consideration of the area of the slave smart phones included in the smartphone group 850 or the area of the slave smart phones.

Such a smart phone usage restricting method may be implemented in an application or may be implemented in the form of program instructions that can be executed through various computer components and recorded in a computer-readable recording medium. The computer-readable recording medium may include program commands, data files, data structures, and the like, alone or in combination.

The program instructions recorded on the computer-readable recording medium may be ones that are specially designed and configured for the present invention and are known and available to those skilled in the art of computer software.

Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROMs and DVDs, magneto-optical media such as floptical disks, media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like.

Examples of program instructions include machine language code such as those generated by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware device may be configured to operate as one or more software modules for performing the processing according to the present invention, and vice versa.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it will be understood by those skilled in the art that various changes and modifications may be made therein without departing from the spirit and scope of the invention as defined in the appended claims. It will be possible.

Claims (10)

A method for restricting use of a user device,
Installing a first usage restriction application on a first user device;
Installing a second usage restriction application on a second user device;
Wherein the identification information of the second user device is registered on the first user device based on the first usage restriction application and the second usage restriction application;
And the use-restricted voice information and the use-unrestricted voice information generated by the voice of the user of the first user equipment based on the first use-restricted application are registered in the second user device through the second use- ;
Switching the second user equipment from an active state to a locked state based on the use-restricted voice information; And
And switching the second user device from the locked state to the activated state based on the use-of-restriction-canceled voice information,
Wherein the first usage restricting application implements a function for the first user device to control whether to use the second user device,
Wherein the second usage restricting application implements a function for the second user device to control whether the first user device restricts use or not,
Wherein the second user equipment receives voice information from outside via a microphone and compares a waveform of the voice information with a waveform of the use restricted voice information to determine whether to switch to the locked state,
Wherein the second user device receives the voice information from the outside via the microphone and compares the waveform of the voice information with the waveform of the use-of-unrestricted voice information to determine whether to switch to the activated state How to restrict use.
delete The method according to claim 1,
Wherein the second usage restricting application is automatically operated as a background application when the location of the first user device and the location of the second user device are within a critical distance,
Wherein the threshold distance is a range of voice signal transmission.
The method of claim 3,
The second user apparatus is switched to the locked state without a comparison procedure between the waveform of the voice information and the waveform of the use limited voice information when the blocking state is maintained for a predetermined time or longer. Use restriction method.
5. The method of claim 4,
Wherein the second user equipment determines that the user is in the blocked state when the noise input through the microphone shows a rapid decrease within a set time.
The use restriction system for a user device may include,
Wherein the first usage restricting application is installed, the identification information of the second user device is registered based on the first usage restricting application, the use limited voice information generated by the user's voice based on the first use restricting application, A first user device configured to register the unrestricted voice information to the second user device via the second usage restriction application; And
Wherein the second usage restriction application is installed and the identification information is registered in the first user device based on the second usage restriction application and the use restriction voice information generated by the voice of the user of the first user device and the fraud And a second user device for registering the use restriction release voice information through the second use restriction application,
The second user device is switched from the active state to the lock state based on the use-restricted voice information, and is switched from the locked state to the activated state based on the use-
Wherein the first usage restricting application implements a function for the first user device to control whether to use the second user device,
Wherein the second usage restricting application implements a function for the second user device to control whether the first user device restricts use or not,
Wherein the second user equipment receives voice information from outside via a microphone and compares a waveform of the voice information with a waveform of the use restricted voice information to determine whether to switch to the locked state,
The second user device is configured to receive the voice information from the outside via the microphone and to determine whether to switch to the activated state by comparing the waveform of the voice information with the waveform of the use- The use restriction system.
delete The method according to claim 6,
Wherein the second usage restricting application is automatically operated as a background application when the location of the first user device and the location of the second user device are within a critical distance,
Wherein the threshold distance is a range of voice signal transmission.
9. The method of claim 8,
The second user apparatus is switched to the locked state without a comparison procedure between the waveform of the voice information and the waveform of the use limited voice information when the blocking state is maintained for a predetermined time or longer. Use restriction system.
10. The method of claim 9,
Wherein the second user equipment determines the blocking state when the noise input through the microphone shows a rapid decrease within a set time.
KR1020150161122A 2015-11-17 2015-11-17 Method and system for restriction of user eqipment KR101600026B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150161122A KR101600026B1 (en) 2015-11-17 2015-11-17 Method and system for restriction of user eqipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150161122A KR101600026B1 (en) 2015-11-17 2015-11-17 Method and system for restriction of user eqipment

Publications (1)

Publication Number Publication Date
KR101600026B1 true KR101600026B1 (en) 2016-03-04

Family

ID=55536101

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150161122A KR101600026B1 (en) 2015-11-17 2015-11-17 Method and system for restriction of user eqipment

Country Status (1)

Country Link
KR (1) KR101600026B1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080060870A (en) * 2006-12-27 2008-07-02 (주) 엘지텔레콤 System and method of restricting function of mobile terminal through voice authentication
KR20140024204A (en) 2012-08-15 2014-02-28 아바고 테크놀로지스 제너럴 아이피 (싱가포르) 피티이 리미티드 Power amplifier
KR20150102395A (en) * 2014-02-28 2015-09-07 가톨릭대학교 산학협력단 Smartphone use restrictions Systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080060870A (en) * 2006-12-27 2008-07-02 (주) 엘지텔레콤 System and method of restricting function of mobile terminal through voice authentication
KR20140024204A (en) 2012-08-15 2014-02-28 아바고 테크놀로지스 제너럴 아이피 (싱가포르) 피티이 리미티드 Power amplifier
KR20150102395A (en) * 2014-02-28 2015-09-07 가톨릭대학교 산학협력단 Smartphone use restrictions Systems

Similar Documents

Publication Publication Date Title
US9307089B2 (en) Conference call systems and methods
US11516304B2 (en) Third-party integration of emergency alert systems
KR102153766B1 (en) Intent engine for enhanced responsiveness in interactive remote communications
WO2016173245A1 (en) Permission management method and device
US20150228281A1 (en) Device, system, and method for active listening
US10716160B2 (en) Dual mode transmission in a controlled environment
US20150358822A1 (en) Utilizations and Applications of Near Field Communications in Mobile Device Management and Security
WO2018166382A1 (en) Method and apparatus for realising real-time voice in virtual scene interaction, and computer-readable storage medium
TW200901716A (en) Systems and methods for controlling service access on a wireless communication device
WO2018137521A1 (en) Method for realizing live voice broadcast in virtual scene interaction client, device and storage medium
US20220256038A1 (en) Transferring an active telephone conversation
US10856043B2 (en) Simultaneous motion of users to trigger establishment of network communications channel
KR20070086670A (en) Mobile phone policy management
KR101678657B1 (en) Method and computer program for providing conference service
US10440327B1 (en) Methods and systems for video-conferencing using a native operating system and software development environment
CN109565506B (en) Control of projection to a media renderer
US11102021B2 (en) Responsive communication system
CN105392141A (en) Device control method and device
US20220239698A1 (en) Securing endpoints for virtual meetings
US11323765B1 (en) Recording manager
JP6125709B2 (en) Output management for Press-to-Transmit communication
KR101600026B1 (en) Method and system for restriction of user eqipment
Landau What was Samsung thinking?
KR101602894B1 (en) System and Method of Secure conference based on near field communication and mobile device management
CN105763428A (en) Information fraud prevention method based on user historical data

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20190225

Year of fee payment: 4