KR101645300B1 - Information communication terminal that implements a security device - Google Patents
Information communication terminal that implements a security device Download PDFInfo
- Publication number
- KR101645300B1 KR101645300B1 KR1020160024507A KR20160024507A KR101645300B1 KR 101645300 B1 KR101645300 B1 KR 101645300B1 KR 1020160024507 A KR1020160024507 A KR 1020160024507A KR 20160024507 A KR20160024507 A KR 20160024507A KR 101645300 B1 KR101645300 B1 KR 101645300B1
- Authority
- KR
- South Korea
- Prior art keywords
- security
- folder
- information communication
- communication terminal
- application
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 83
- 239000000758 substrate Substances 0.000 claims description 16
- 229910052751 metal Inorganic materials 0.000 claims description 14
- 239000002184 metal Substances 0.000 claims description 14
- 230000000994 depressogenic effect Effects 0.000 claims description 3
- 230000005611 electricity Effects 0.000 claims description 3
- WABPQHHGFIMREM-UHFFFAOYSA-N lead(0) Chemical compound [Pb] WABPQHHGFIMREM-UHFFFAOYSA-N 0.000 claims description 2
- 238000000034 method Methods 0.000 description 87
- 239000003086 colorant Substances 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000017531 blood circulation Effects 0.000 description 6
- 239000000843 powder Substances 0.000 description 6
- 239000000463 material Substances 0.000 description 5
- NINIDFKCEFEMDL-UHFFFAOYSA-N Sulfur Chemical compound [S] NINIDFKCEFEMDL-UHFFFAOYSA-N 0.000 description 4
- BASFCYQUMIYNBI-UHFFFAOYSA-N platinum Chemical compound [Pt] BASFCYQUMIYNBI-UHFFFAOYSA-N 0.000 description 4
- 239000011247 coating layer Substances 0.000 description 3
- 239000013078 crystal Substances 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000036541 health Effects 0.000 description 3
- 230000001737 promoting effect Effects 0.000 description 3
- 239000000126 substance Substances 0.000 description 3
- 229910052717 sulfur Inorganic materials 0.000 description 3
- 239000011593 sulfur Substances 0.000 description 3
- IJGRMHOSHXDMSA-UHFFFAOYSA-N Atomic nitrogen Chemical compound N#N IJGRMHOSHXDMSA-UHFFFAOYSA-N 0.000 description 2
- 241000196324 Embryophyta Species 0.000 description 2
- 230000004308 accommodation Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 2
- 230000000844 anti-bacterial effect Effects 0.000 description 2
- 229910052586 apatite Inorganic materials 0.000 description 2
- 230000001877 deodorizing effect Effects 0.000 description 2
- 229910052500 inorganic mineral Inorganic materials 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 239000011707 mineral Substances 0.000 description 2
- VSIIXMUUUJUKCM-UHFFFAOYSA-D pentacalcium;fluoride;triphosphate Chemical compound [F-].[Ca+2].[Ca+2].[Ca+2].[Ca+2].[Ca+2].[O-]P([O-])([O-])=O.[O-]P([O-])([O-])=O.[O-]P([O-])([O-])=O VSIIXMUUUJUKCM-UHFFFAOYSA-D 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 229920002545 silicone oil Polymers 0.000 description 2
- 230000002194 synthesizing effect Effects 0.000 description 2
- 229910052613 tourmaline Inorganic materials 0.000 description 2
- 229940070527 tourmaline Drugs 0.000 description 2
- 239000011032 tourmaline Substances 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 239000010456 wollastonite Substances 0.000 description 2
- 229910052882 wollastonite Inorganic materials 0.000 description 2
- KRQUFUKTQHISJB-YYADALCUSA-N 2-[(E)-N-[2-(4-chlorophenoxy)propoxy]-C-propylcarbonimidoyl]-3-hydroxy-5-(thian-3-yl)cyclohex-2-en-1-one Chemical compound CCC\C(=N/OCC(C)OC1=CC=C(Cl)C=C1)C1=C(O)CC(CC1=O)C1CCCSC1 KRQUFUKTQHISJB-YYADALCUSA-N 0.000 description 1
- 206010003210 Arteriosclerosis Diseases 0.000 description 1
- 241000416162 Astragalus gummifer Species 0.000 description 1
- OYPRJOBELJOOCE-UHFFFAOYSA-N Calcium Chemical compound [Ca] OYPRJOBELJOOCE-UHFFFAOYSA-N 0.000 description 1
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 235000001543 Corylus americana Nutrition 0.000 description 1
- 240000007582 Corylus avellana Species 0.000 description 1
- 235000007466 Corylus avellana Nutrition 0.000 description 1
- 241000208680 Hamamelis mollis Species 0.000 description 1
- 241000208681 Hamamelis virginiana Species 0.000 description 1
- FYYHWMGAXLPEAU-UHFFFAOYSA-N Magnesium Chemical compound [Mg] FYYHWMGAXLPEAU-UHFFFAOYSA-N 0.000 description 1
- 229920000715 Mucilage Polymers 0.000 description 1
- OAICVXFJPJFONN-UHFFFAOYSA-N Phosphorus Chemical compound [P] OAICVXFJPJFONN-UHFFFAOYSA-N 0.000 description 1
- 206010040880 Skin irritation Diseases 0.000 description 1
- 229920001615 Tragacanth Polymers 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000032683 aging Effects 0.000 description 1
- 208000011775 arteriosclerosis disease Diseases 0.000 description 1
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 239000011575 calcium Substances 0.000 description 1
- 229910052791 calcium Inorganic materials 0.000 description 1
- 239000013522 chelant Substances 0.000 description 1
- 239000002738 chelating agent Substances 0.000 description 1
- 230000004087 circulation Effects 0.000 description 1
- 239000000084 colloidal system Substances 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 239000011889 copper foil Substances 0.000 description 1
- 239000008406 cosmetic ingredient Substances 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 206010012601 diabetes mellitus Diseases 0.000 description 1
- 235000012489 doughnuts Nutrition 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 208000019622 heart disease Diseases 0.000 description 1
- 229910001385 heavy metal Inorganic materials 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 150000002500 ions Chemical class 0.000 description 1
- 210000004185 liver Anatomy 0.000 description 1
- 239000011777 magnesium Substances 0.000 description 1
- 229910052749 magnesium Inorganic materials 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229910052757 nitrogen Inorganic materials 0.000 description 1
- 235000015097 nutrients Nutrition 0.000 description 1
- 229910052760 oxygen Inorganic materials 0.000 description 1
- 239000001301 oxygen Substances 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 229910052698 phosphorus Inorganic materials 0.000 description 1
- 239000011574 phosphorus Substances 0.000 description 1
- 229910052697 platinum Inorganic materials 0.000 description 1
- 239000004417 polycarbonate Substances 0.000 description 1
- 229920005668 polycarbonate resin Polymers 0.000 description 1
- 239000004431 polycarbonate resin Substances 0.000 description 1
- -1 polytetrafluoroethylene Polymers 0.000 description 1
- 229920001343 polytetrafluoroethylene Polymers 0.000 description 1
- 239000004810 polytetrafluoroethylene Substances 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 102000004169 proteins and genes Human genes 0.000 description 1
- 108090000623 proteins and genes Proteins 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 239000012857 radioactive material Substances 0.000 description 1
- 239000000941 radioactive substance Substances 0.000 description 1
- 229920005989 resin Polymers 0.000 description 1
- 239000011347 resin Substances 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 239000011435 rock Substances 0.000 description 1
- 238000007665 sagging Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000036556 skin irritation Effects 0.000 description 1
- 231100000475 skin irritation Toxicity 0.000 description 1
- 239000002689 soil Substances 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 229940116362 tragacanth Drugs 0.000 description 1
- 235000010487 tragacanth Nutrition 0.000 description 1
- 239000000196 tragacanth Substances 0.000 description 1
- 235000013311 vegetables Nutrition 0.000 description 1
- 229940118846 witch hazel Drugs 0.000 description 1
Images
Classifications
-
- H04M1/72519—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/02—Constructional features of telephone sets
- H04M1/0202—Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
- H04M1/026—Details of the structure or mounting of specific components
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
Abstract
Description
BACKGROUND OF THE
As is well known, information communication terminals, such as smart phones, tablet PCs, and smart TVs, which are currently spreading, are displayed with icons or folders of applications on the display, and users can execute applications by touch or open data files GUI (Graphic User Interface) is adopted.
In general, a user collects applications and files to be specifically managed, such as frequently used and privacy-related data, and manages them in a folder.
However, current security methods have some inefficiencies in terms of security level and ease of application operation.
First, the icon of the application is expressed by inherent image information considering the CI (corporate identity) of the application developer, the expression of the property of the application, and the aesthetic point of view.
Therefore, even if only the icon of the application is seen, the user can know which application is used and which content is mainly consumed.
Especially, when the icon of the application including contents such as SNS (social network service, social network service), financial transaction institution, map search service, and adult video contents is exposed recently, important information related to privacy is transmitted to another person It is likely to be leaked.
In addition, with the development of hardware for information communication terminals such as cameras and microphones, the dissemination of applications for contents production has been expanded. Therefore, UCC (User Created Contents, user created contents) of music and video, The case of being manufactured in information communication terminal is increasing.
Accordingly, in the past, the information communication terminal, which has merely served as a telephone or a PDA, plays a role of a content creation device, and needs to be enhanced in level of the PC environment. However, in the security of the current information communication terminal, And so on.
In conclusion, there is a problem that there is currently no way to take special measures on the level of security of ICT terminals, regarding the information related to privacy or the exposure of UCC.
Secondly, most information communication terminals currently prevent access by others, not the owner of the information communication terminal, by inputting a password or drawing a pattern on the initial screen.
However, there are some applications that do not have a risk of leakage of personal information or leaked out, so that there is no need for a separate security procedure. Even when these applications are executed, it is troublesome to go through security procedures.
For example, it is necessary to repeat the security procedure every time when an application such as an Angry Bird or a Tetris is frequently used, such as a game or an Internet search, but does not require security for others, have.
SUMMARY OF THE INVENTION The present invention has been made in view of the above-mentioned problems in the prior art, and it is an object of the present invention to provide a method and apparatus for setting a security level differently in an application or folder of an information communication terminal, The present invention has been made to solve the above-mentioned problems occurring in the prior art.
According to an aspect of the present invention, there is provided a method of securing a security level to be applied to an application or a folder in a first stage security or a second stage security (S200) (S300) and a password setting step by voice recognition. When the first step security is set, an icon of an application or a folder is identifiable (S210) When the security of the second stage is established, the icon of the application or the folder becomes unidentifiable (S220), the security of the first stage security is released when the screen of the information communication terminal is turned on, (Step S310) in addition to the application or folder in which the step security is set (step S310). An information communication terminal comprising:
A donut-
According to the present invention, the security level can be differentially set to the application or the folder of the information communication terminal, and the security level can be increased.
In addition, since the microphone can be implemented as an exposure type in the information communication terminal, it is possible to further enhance the voice recognition performance.
In addition, the blood circulation promoting material is applied to the back cover of the information communication terminal, thereby contributing to the health promotion of the user.
FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.
2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.
FIG. 2B is an exemplary view showing a shortcut icon for a folder or the like to which the first-level security is applied.
3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.
Fig. 4 is an exemplary view of an information communication terminal screen when the word completion method is used.
FIG. 5 is a diagram illustrating an example of a color input window popped up when the third-level security is set using the background color setting method of the present invention.
FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.
7 is an exemplary sectional view showing a microphone installation structure of an information communication terminal according to the present invention.
8 is an exemplary view of a built-in antenna of an information communication terminal according to the present invention.
9 is an exemplary view showing a cradle of an information communication terminal according to the present invention.
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Before describing the present invention, the following specific structural or functional descriptions are merely illustrative for the purpose of describing an embodiment according to the concept of the present invention, and embodiments according to the concept of the present invention may be embodied in various forms, And should not be construed as limited to the embodiments described herein.
In addition, since the embodiments according to the concept of the present invention can make various changes and have various forms, specific embodiments are illustrated in the drawings and described in detail herein. However, it should be understood that the embodiments according to the concept of the present invention are not intended to limit the present invention to specific modes of operation, but include all modifications, equivalents and alternatives falling within the spirit and scope of the present invention.
Prior to a specific description of the present invention, the security level setting method included in the system of the present invention follows the contents disclosed in the above-mentioned Japanese Patent No. 10-1320473. Therefore, the part related to the security procedure setting in the following description is disclosed in the registered patent, and the speech recognition technique is further described in relation to the information communication system to which the setting method is applied, or more precisely, the security level setting in the information communication terminal It also includes the microphone's flow structure to enhance speech recognition accuracy as a distinctive technical element.
The present invention is based on the idea that security levels are differentiated according to the importance of an application or a folder in order to effectively apply a security level to an application or a folder displayed on an information communication terminal.
The security level setting method of an information communication terminal according to the present invention is a security level setting method for a first level security that can identify an application or a folder, a second level security that can not identify an application or a folder, And third level security.
FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.
In the security level setting method of the information communication terminal according to the present invention, each security procedure can be collectively applied to an application or a folder (hereinafter referred to as a 'folder') individually or at a system administrator level.
First, whether the security step to be applied is an individual security for a folder or the like, or a batch security for an entire folder is selected (S100).
In the case of individual security, an attribute window such as a folder is activated (S110). If the security is bulk security, the system administrator is activated (S120).
Hereinafter, the first stage security to the third stage security is established. Since the same method is applied to the security step to be set whether individual security or bulk security, the case of individual security will be described below.
When a property window such as a folder is activated (S110), a security step to be applied to the first stage security or the second stage security is set to a folder (S200).
When the first level security is set, icons such as folders are identifiable (S210). When the security of the second level is set, icons such as folders are not identifiable (S220).
Next, a third-level security is selectively set in a folder in which a second-level security is set (S300). When the third-level security is set, a security procedure is additionally set (S310) If it is not set, the second stage security state is terminated.
The security procedures to be added in the third stage security are different from each other in the specific methods to be described later, but the basic ideas are the same.
If you enter the word, password, background color, border settings, and submit according to the security procedure selected in the security menu of the property window such as folder, setting is completed.
When a screen of the information communication terminal in which the security of the first stage security or the security of the third stage is set is turned on, an icon such as a folder corresponding to the corresponding security level is displayed. When a security procedure required by each security stage is passed, And the security is released.
Each security step is described in detail below.
2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.
The first step security is a security step in which a folder or the like is exposed and the inside of the
That is, the first stage security is a step of releasing security when the screen of the information communication terminal is turned on. It is a game which can be accessed by anyone, an icon for executing the Internet, a UCC that the user considers open even if the user opens it, Etc. are subject to the first stage security.
In many cases, when the screen of the information communication terminal is turned on, the security for the information communication terminal itself is often set by a password, a pattern drawing or the like. In the first stage security, security for the information communication terminal itself is preceded The state of the
Under the icon of the folder or the like in the first stage security, the name of the application or the folder is displayed by, for example, 'camera', 'utility', 'IMAGE', 'SNS'
Since the folder to which the first step security is applied should be able to provide the user with ease of driving, it is necessary to collect folders or the like to which the first step security is applied so that the user can directly recognize the information when the screen of the information communication terminal is turned on, The folder to which the application is applied, and the like can be opened.
FIG. 2B shows a
2B, the user can execute applications such as weather, stock price, and YouTube without having to go through the initial security procedure of the information communication terminal. The user can directly
3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.
The second level security is a security step in which a folder or the like is exposed but the icon of the application or the inside of the folder can not be identified even when the screen of the information communication terminal is turned on.
The second stage security is required because when a screen of the information communication terminal is turned on to execute a folder to which first level security is applied and the like, a folder which is not intended to be disclosed to others, such as an application including adult- So as to prevent exposure.
As an embodiment of the second stage security, there is a method in which a
At this time, the name of the folder or the like disappears below the folder to which the second level security is applied.
Instead, the user may display a character or an image that can be associated only with the user on an icon such as a folder in order to facilitate the identification of the folder or the like having the second-level security.
The second stage security can not only identify the icon or the folder inside the application. To execute the application or open the folder, an icon such as a folder may be executed by a touch or the like.
In a device such as a smart TV, which is not a touch screen type, a cursor can be positioned on an icon of a folder or the like using a remote control and can be executed by a click method or the like.
The state after the security of the folder where the security of the second stage is applied is largely divided into two kinds.
First, the information communication terminal screen is in a state where it can identify the icon or the inside of the application in the same manner as the example of the screen of the information communication terminal applying the first step security in FIG. 2A. Second, If you want to make sure that you have selected the folder correctly, you can set the first method. If you want to reduce the number of touches or clicks, you can set the second method.
Since the third step security is a security process added to the second step security, the initial screen of the folder to which the third step security is applied is the same as that of the information communication terminal screen applying the second step security shown in FIG.
The difference between the third-level security and the second-level security is that, in the case of the second-level security, when an icon such as a folder is touched or clicked, the security is immediately released and the icon or the inside of the folder can be identified, Or a folder is opened. In the case of the third-level security, an application or a folder can be opened only after a separate security process is performed after a touch or a click.
Although there are various security procedures in the third step security, in the security level setting method of the information communication terminal according to the present invention, four methods of word completion, password input, background color setting, and border setting , 'Password setting method', 'background color setting method', and 'border setting method').
Hereinafter, the security procedure applied in the third step security of the present invention will be described in detail for each embodiment.
[Example 1]
The word completion method is similar to the second level security, in which a character set by a user is displayed in the middle of an icon of a folder or the like, or when the icon is replaced with an image set by the user, When the word is activated, the word completion window is opened and the application is executed or the folder is opened when the set word is completed.
For example, if the user sets the word " House " in the folder for the third level security, only 'H' is displayed in the center of the folder on the initial screen of the information communication terminal, You will be able to open the folder only if you fill out the word completion window and enter the remaining 'ouse'.
FIG. 4 illustrates a screen of the information communication terminal when the word completion method is used. The user activates an icon such as a folder by a method such as touch or click, and the
The advantage of the word completion method in comparison with the existing security procedures such as password input is that it provides the user with a hint about the security release.
Of course, there are some hints about unsecure, which makes it easier for others to access, but it is more convenient for users to easily remember their own password.
In general, the same password is set when not only folders but also e-mails, financial accounts, and other passwords are required because of the problem that it is easy to forget when using multiple passwords. In this case, even if only one password is leaked, Security can be compromised.
The word completion method of the present invention is intended to solve a problem that is easy to forget when a plurality of passwords are written by showing only a few letters of words.
In the example of 'House' above, if the folder is the folder where the house photos are stored, even if 'H' alone, the user who set 'House' can fill in the remaining 'ouse' It does not know whether it means 'Horse' or 'Hospital', and it is difficult to pass the security procedure.
Therefore, the user can increase the security level by setting different words for each application or folder.
That is, the word completion method of the present invention can increase the overall security level by allowing the user to set various words for each application or folder without increasing the possibility of security threats by others have.
[Example 2]
The password input method is the same as the security method through which a password is inputted when a screen of the information communication terminal is conventionally turned on or when a specific application is to be executed.
The password input method can be applied to easily detect the use of another person so that the information communication terminal can not be turned on (often called a " locked state ").
In general, when a password is set when the screen of the information communication terminal is turned on, a security means for preventing the information communication terminal from being turned on for a predetermined period of time such as 30 minutes or 1 hour when the password is incorrectly inputted consecutively three or more times Is used.
In the password input method of the present invention, the security by the conventional password is applied to a folder or the like. The difference from the conventional security by the password is the number which should not be inputted by the password. In other words, when setting the trap number, It is not only impossible to execute a folder or the like if the password is wrong, but it is characterized in that the information communication terminal can not be turned on immediately when a password number is input as a trap number that should not be inputted by a password.
For example, if the password set in the folder is 1234 and the number that should not be entered with the password is 9, if the other person executes a folder or the like and inputs a password including 9, the information communication terminal can be turned into a state in which the information communication terminal can not be turned on for a predetermined time have.
[Example 3]
The background color setting method is a method of setting a security procedure using the background color of an icon such as a folder in which characters set by a user are displayed.
The user can designate a background color to an icon such as a folder or the like. In the present background color setting method, a plurality of background colors are designated and it is determined that the security procedure has been passed when the specified plurality of background colors are input.
FIG. 5 illustrates a
The color input window may be a general CIE color diagram as shown in FIG. 5 (a) or a palette shape as shown in FIG. 5 (b) in which a plurality of colors set by the user are expressed. Is optional.
When setting the third level security using the background color setting method, one or more background colors designated by the user are security measures.
If two or more background colors are specified, the background color according to the background color setting method is determined to be a composite color of two or more background colors.
The background color setting method is based on the fact that it is difficult to find the background color before synthesizing from the synthesized background color. The user can specify the background color before synthesizing only the synthesized background color. However, It is very difficult to find out what colors were synthesized if several background colors were synthesized.
For example, when the CIE color chart is used as the
The other person can see the background color c, but it is difficult to find a and b by looking at c because the color that can synthesize the background color c can be very diverse such as a1-b1 and a2-b2.
On the other hand, the user can easily find a and b because he or she sets the background color, so there is no difficulty in passing the security procedure.
In this respect, the security level by the background color setting method can increase dramatically as the number of background colors increases to three, four, or more.
When the user desires to activate the icon of the folder or the like by activating the background color setting method, the CIE color diagram or palette used for the security setting by the background color setting method is popped up again and the background color is inputted from the user Can be performed.
[Example 4]
The user can specify the shape of the border of the icon such as a folder or the like. The border setting method of the present invention is a method of setting a security procedure according to a pattern in which a user rotates a vertex of an
FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.
As shown in FIG. 6 (a), icons such as a folder to which the border setting method is applied are in a state in which the edges of a triangle, a rectangle, a hexagon, an octagon, and the like are set.
The security setting by the border setting method is enabled by touching one of the vertices of the
For example, as shown in FIG. 6 (b), the right vertex of the regular hexagon is touched and rotated in the clockwise direction, the left vertex of the regular hexagon is touched to rotate clockwise, The security setting is completed.
In order to execute a folder or the like, the security can be released by touching the vertex of the
One of the 'word completion method', 'password input method', 'background color setting method' and 'frame setting method' of the first to fourth embodiments may be used in the third step security setting, It can also be used for a three-step security configuration.
For example, if the 'word completion method' and 'background color setting method' are combined, the user first sets the background color through the color input window after completing the word set through the word input window, .
As described above, the first step security, the second step security, and the third step security of the security level setting method of the information communication terminal according to the present invention may be collectively applied to the entire folders through the system manager of the information communication terminal, Folders or the like.
In addition, the background color setting method or the frame setting method described in the third and fourth embodiments of the present invention may be set as a terminal security means for replacing a password input or a pattern drawing when the screen of the information communication terminal is turned on.
The present invention is configured to include a voice recognition technology in the information communication terminal to set a security function while including the above contents in a basic configuration.
At this time, the speech recognition technology uses a known speech recognition method, and is configured such that the security is released by checking whether the user's voice, more precisely the frequency band, is stored and matched.
For example, since the frequency bands in which a specific word is pronounced for each person are different, if a specific word, such as 'Mugunghwa' is pronounced and stored as a password, the password is released in response to only 'Mugunghwa' And the like.
Such a method is a technology already known and used in a smart phone or the like.
It should be noted, however, that the present invention is not intended to be technically protected by the speech recognition technology itself, but rather relates to a flow structure of a microphone which is indispensably required in voice recognition.
That is, as shown in FIG. 7 (a), a microphone (MIC) in the
Therefore, it is difficult to accurately obtain the pronunciation of the user when applying the speech recognition technology. The difficulty here is not the concept of not being able to acquire, but it means that the recognition rate is high due to the large amount of noise.
7 (b), the
To this end, the structure of the
The
In particular, the
Although the present invention adopts the dome switch type as it is, the shape of the dome switch and the shape of the contact point of the terminal are deformed.
That is, the
A
Accordingly, when the
Since the
On the other hand, the
Particularly, the inner bottom surface of the hollow 110 is sealed, a lead-out
Here, the lead-out
An upper portion of the
Therefore, if the
Therefore, when the upper segment portion having the
The
Accordingly, the
In addition, an
In the present invention having such a configuration, when the voice recognition function is activated to set the security using the voice recognition technology or to release the set security, the micro-pump 130 is activated by receiving the signal at the same time.
Then, the air inside the hollow 110 is supplied to the
At this time, in order to smoothly supply the air, a hole (HOL) communicating with the hollow 110 is further formed in a part of the circumference of the
When the
Therefore, when the user utters the sound, the sound from the mouth is input directly in the vertical direction at the maximum, and the accuracy of the acquired pronunciation is enhanced. This improves the speech recognition rate.
When the voice recognition function is canceled, the micro-pump 130 stops driving, so that the air in the
In the present invention, considering the fact that the
According to the present invention, a component capable of promoting blood circulation is coated on the surface of the back cover (BK, see FIG. 7) of the
For this, 15 parts by weight of pegmatite powder, 5 parts by weight of platinum powder, 1 part by weight of apatite powder, 2 parts by weight of sulfur powder, and 1 part by weight of polytetrafluoroethylene were added to 100 parts by weight of polycarbonate resin as a main material of back cover (BK) 2 parts by weight of tourmaline powder, 3 parts by weight of Hosel leaf extract, 4 parts by weight of silicone oil, 2 parts by weight of tragacanth and 2 parts by weight of wollastonite powder.
At this time, the pegmatite is a known substance having a property of promoting blood circulation as is known, and in order to increase the effect, the pegmatite should have a particle size of 0.35 μm-1 μm. This pegmatite is a differentiated ore product of magma, also called gigantic granitic rock. It is a colored radioactive material and ore that can act pharmacologically. It is a mineral which contains 9 kinds of components favorable to human body among 20 kinds of components, It has far infrared ray radiation and antibacterial deodorizing function as material of radiator.
In the present invention, it is used as a main component to be mixed for activation of the body cell and promotion of blood circulation.
The platinum powder is a platinum colloidal material that is mainly used as a cosmetic ingredient and is known as a substance that promotes skin activation by preventing aging such as sagging or wrinkling of the skin and removing active oxygen. In addition, medicines have been reported to improve liver, heart disease, arteriosclerosis and diabetes. In the present invention, it is added to promote skin circulation and reduce skin irritation.
In addition, apatite is a hexagonal system of hexagonal or hexagonal crystals and has been used for fertilizing soil for a long time because it has a complex structure containing a large amount of phosphorus, nitrogen, calcium and magnesium. However, in the present invention, it is added because it has a large effect of contributing to formation of mucilage between pegmatite powder and water while providing nutrients to the skin when the skin is contacted for the blood-stimulating function.
In addition, sulfur is added in the present invention so that the sulfur is combined with harmful heavy metal ions or radioactive substances and discharged to the outside of the body. In particular, vegetable sulfur serves as a chelating agent, and the harmful substance is made into a chelate compound and discharged to the outside of the body.
Further, the tourmaline fine powder is a mineral belonging to the hexagonal system having a crystal structure such as crystal, and is known as a material which permanently generates electromagnetic waves having a wavelength band of approximately 4 to 14 microns.
It has been reported that electromagnetic waves in the wavelength band of 4 to 14 microns have been reported to activate cells of plants and plants, synthesize proteins, or purify polluted water.
The above-mentioned HAZEL Leaf Extract is extracted from leaf, which is used for medicinal purposes, in Witch Hazel (Hamamelis Virginiana), a kind of deciduous tree that lives in the subtropical zone, and has a deodorizing and antibacterial function.
In addition, the silicone oil not only enhances lubricity upon mixing with a resin but also is for a liquidization close to a colloid of the mixture, and the tragacantha is added as a kind of rubber component for viscosity control, Powdered wollastonite having needle-like needle-shaped structure is used because it increases tensile strength and flexural strength.
In order to confirm the effect of this coating layer, a resting period of 30 minutes with a back cover (BK) with a coating layer resulted in an average heart rate (tested for 4 men in their 40s) when the back cover (BK) 88, but the average heart rate increased to 98 when measured with a back cover (BK). At this time, the blood circulation measuring instrument was model SMART PLUSE, manufacturer Medico.
Through this, we were able to confirm the efficacy.
8, a
The
The
Since the conventional planar antenna is mainly printed on the lower substrate of the
Accordingly, in the present invention, the
In addition, the
Since the received radio wave is directly transmitted to the
In addition, when the
In addition, there is an inconvenience in that a separate support base is required to be installed to adjust the angle of the base, and recently, the case base is disadvantageous in that the stability of the case is deteriorated.
Thus, the present invention also includes a
The mounting
Accordingly, when the
Then, the
At this time, the
In addition, the hinge HIN includes an
At this time, the
In addition, the
Accordingly, when the mounting
Since the
In addition, when the
That is, it is fixed by the
With such a structure, when the seating table 460 is placed, the
Particularly, since such a structure can be made very thin, it is convenient to carry and is inexpensive to manufacture.
10
12
14
17
30 color input window
Claims (1)
A donut-shaped substrate terminal 220 is formed on the substrate 210 in order to charge the micro-microphone 200 used in performing the password setting by the voice recognition into the home button 100 of the information communication terminal 10 ; A dome switch 230 is fixed to the upper surface of the substrate 210; The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240 and a through hole 250 at the center thereof to form a donut-shaped A dome terminal 260 is provided to be in contact with the substrate terminal 220; The groove button (100) is a cylindrical shape having a hollow (110) formed therein. The inner bottom surface of the hollow 110 is sealed and a lead wire outflow hole 120 is formed at the center. A bottom surface of the groove button 100 is seated on the flat portion 240; An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion. Similarly, the inner jaw 150 protrudes a certain length toward the center of the circle; A micro pump (130) is installed on the bottom surface of the hollow (110); An air tube (160) is installed at an upper portion of the micro pump (130) and connected to the micro pump (130); A microphone case 170 having a 'ㅗ' shape is seated on the air tube 160; A micro microphone (180) is embedded in the microphone case (170); A lower flange 172 is formed around the lower end of the microphone case 170; An elastic spring (190) is interposed between the inner flange (150) and the lower flange (172); The cradle 400 includes a base plate 410 and an upper surface of the base plate 410. The base plate 410 is disposed on the upper surface of the base plate 410, A hinge HIN provided on both side walls inserted at both ends of the mounting plate 420 while the both ends of the mounting plate 420 are inserted into the base plate 410, Type battery 440 which is detachably incorporated in the hinge HIN and selectively supplies electricity to the electromagnet coil 530 provided on the hinge HIN, A switch 450 installed on the base plate 410; and a seating table 460 hingedly mounted on the surface of the mounting plate 420 so as to be vertically installed; The hinge HIN includes an outer housing 510 fixed to both sides of one end of the mounting plate receiving groove H1, an inner housing 520 having a smaller diameter assembled to the outer housing 510, A coil 530 installed in a space between the inner housing 520 and the inner housing 520 and a metal ring 540 fitted in the inner housing 520 and having a plurality of protruding holes 542 formed at a predetermined interval around the inner housing 520, A rubber ring 550 having a rubber projection 552 formed on the circumferential surface of the metal ring 540 and exposed through the projection hole 542 and a rubber ring spline 554 formed on the inner circumference of the rubber ring 550, And a rotation shaft (560) protruding from both ends of the mounting plate (420) and having a shaft spline (562) engaged with the rubber ring spline (554).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160024507A KR101645300B1 (en) | 2016-02-29 | 2016-02-29 | Information communication terminal that implements a security device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160024507A KR101645300B1 (en) | 2016-02-29 | 2016-02-29 | Information communication terminal that implements a security device |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101645300B1 true KR101645300B1 (en) | 2016-08-03 |
Family
ID=56708804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160024507A KR101645300B1 (en) | 2016-02-29 | 2016-02-29 | Information communication terminal that implements a security device |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101645300B1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000066299A (en) * | 1999-04-15 | 2000-11-15 | 이정훈 | Variable length handphones |
KR100768042B1 (en) * | 2006-11-23 | 2007-10-17 | 삼성전자주식회사 | Portable terminal with protrusion type mic module |
KR20130006265U (en) * | 2012-04-21 | 2013-10-30 | 고영림 | portable mobile phone stand combind with mirror |
KR101320473B1 (en) | 2012-04-25 | 2013-11-21 | 김성은 | Method for setting up security level of information and communication device |
-
2016
- 2016-02-29 KR KR1020160024507A patent/KR101645300B1/en active IP Right Grant
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000066299A (en) * | 1999-04-15 | 2000-11-15 | 이정훈 | Variable length handphones |
KR100768042B1 (en) * | 2006-11-23 | 2007-10-17 | 삼성전자주식회사 | Portable terminal with protrusion type mic module |
KR20130006265U (en) * | 2012-04-21 | 2013-10-30 | 고영림 | portable mobile phone stand combind with mirror |
KR101320473B1 (en) | 2012-04-25 | 2013-11-21 | 김성은 | Method for setting up security level of information and communication device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10606226B2 (en) | Method for controlling an external device and an electronic device therefor | |
CN108885498B (en) | Electronic device and method for providing information in electronic device | |
US10402625B2 (en) | Intelligent electronic device and method of operating the same | |
KR102468129B1 (en) | Electronic device and manufacturing method thereof | |
KR102442098B1 (en) | Electronic device including bended dispaly and image diaplaying method therethrough | |
KR102498451B1 (en) | Electronic device and method for provideing information in the electronic device | |
CN108351696B (en) | Electronic device comprising a plurality of displays and method of operating the same | |
KR102405446B1 (en) | Antenna device and electronic device | |
KR102313898B1 (en) | Wearable electronic device | |
EP4086861A1 (en) | Method for acquiring biometric information and electronic device supporting the same | |
US20160085950A1 (en) | Method and system for controlling usage rights and user modes based on face recognition | |
KR102486127B1 (en) | Electronic device having key structure and manufacturing method thereof | |
CN108713185A (en) | Electronic device and its display and the method for sending image | |
US20170094511A1 (en) | Method of performing communication and electronic device supporting same | |
CN106257428A (en) | For providing equipment and the method for the notice about wireless charging state | |
CN108351890A (en) | Electronic device and its operating method | |
CN106250738A (en) | For performing electronic installation and the method thereof of personal authentication | |
KR20160034744A (en) | Key waterproof apparatus | |
US9983688B2 (en) | Protective cover | |
CN106912190A (en) | Electronic equipment including shielding construction | |
US10978844B2 (en) | Pogo module and electronic device comprising same | |
CN109075424A (en) | For sending the electronic device of electromagnetic wave along multiple directions | |
KR102256580B1 (en) | Wearable Electronic Device Including Communication Circuit | |
CN108537018A (en) | Carry out the method for the electronic equipment and operation electronic equipment of certification using biological information | |
KR20150082043A (en) | Electronic device having waterproof structure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |