KR101645300B1 - Information communication terminal that implements a security device - Google Patents

Information communication terminal that implements a security device Download PDF

Info

Publication number
KR101645300B1
KR101645300B1 KR1020160024507A KR20160024507A KR101645300B1 KR 101645300 B1 KR101645300 B1 KR 101645300B1 KR 1020160024507 A KR1020160024507 A KR 1020160024507A KR 20160024507 A KR20160024507 A KR 20160024507A KR 101645300 B1 KR101645300 B1 KR 101645300B1
Authority
KR
South Korea
Prior art keywords
security
folder
information communication
communication terminal
application
Prior art date
Application number
KR1020160024507A
Other languages
Korean (ko)
Inventor
윤갑구
박창현
Original Assignee
주식회사 에이스기술단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 에이스기술단 filed Critical 주식회사 에이스기술단
Priority to KR1020160024507A priority Critical patent/KR101645300B1/en
Application granted granted Critical
Publication of KR101645300B1 publication Critical patent/KR101645300B1/en

Links

Images

Classifications

    • H04M1/72519
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The present invention relates to an information and communications terminal implementing a security device. More specifically, the present invention relates to an information and communications terminal implementing a security device raising a security level by differentially setting a security degree in an application or a folder of the information and communications terminal.

Description

[0001] The present invention relates to an information communication terminal,

BACKGROUND OF THE INVENTION 1. Field of the Invention [0001] The present invention relates to an information communication terminal that implements a security device in an information communication technology field, more specifically, And a communication terminal.

As is well known, information communication terminals, such as smart phones, tablet PCs, and smart TVs, which are currently spreading, are displayed with icons or folders of applications on the display, and users can execute applications by touch or open data files GUI (Graphic User Interface) is adopted.

In general, a user collects applications and files to be specifically managed, such as frequently used and privacy-related data, and manages them in a folder.

However, current security methods have some inefficiencies in terms of security level and ease of application operation.

First, the icon of the application is expressed by inherent image information considering the CI (corporate identity) of the application developer, the expression of the property of the application, and the aesthetic point of view.

Therefore, even if only the icon of the application is seen, the user can know which application is used and which content is mainly consumed.

Especially, when the icon of the application including contents such as SNS (social network service, social network service), financial transaction institution, map search service, and adult video contents is exposed recently, important information related to privacy is transmitted to another person It is likely to be leaked.

In addition, with the development of hardware for information communication terminals such as cameras and microphones, the dissemination of applications for contents production has been expanded. Therefore, UCC (User Created Contents, user created contents) of music and video, The case of being manufactured in information communication terminal is increasing.

Accordingly, in the past, the information communication terminal, which has merely served as a telephone or a PDA, plays a role of a content creation device, and needs to be enhanced in level of the PC environment. However, in the security of the current information communication terminal, And so on.

In conclusion, there is a problem that there is currently no way to take special measures on the level of security of ICT terminals, regarding the information related to privacy or the exposure of UCC.

Secondly, most information communication terminals currently prevent access by others, not the owner of the information communication terminal, by inputting a password or drawing a pattern on the initial screen.

However, there are some applications that do not have a risk of leakage of personal information or leaked out, so that there is no need for a separate security procedure. Even when these applications are executed, it is troublesome to go through security procedures.

For example, it is necessary to repeat the security procedure every time when an application such as an Angry Bird or a Tetris is frequently used, such as a game or an Internet search, but does not require security for others, have.

Korea Patent Registration No. 10-1320473 (Oct. 15, 2013) 'How to Set Security Level of Information Communication Terminal'

SUMMARY OF THE INVENTION The present invention has been made in view of the above-mentioned problems in the prior art, and it is an object of the present invention to provide a method and apparatus for setting a security level differently in an application or folder of an information communication terminal, The present invention has been made to solve the above-mentioned problems occurring in the prior art.

According to an aspect of the present invention, there is provided a method of securing a security level to be applied to an application or a folder in a first stage security or a second stage security (S200) (S300) and a password setting step by voice recognition. When the first step security is set, an icon of an application or a folder is identifiable (S210) When the security of the second stage is established, the icon of the application or the folder becomes unidentifiable (S220), the security of the first stage security is released when the screen of the information communication terminal is turned on, (Step S310) in addition to the application or folder in which the step security is set (step S310). An information communication terminal comprising:

A donut-shaped substrate terminal 220 is formed on the substrate 210 in order to charge the micro-microphone 200 used in performing the password setting by the voice recognition into the home button 100 of the information communication terminal 10 ; A dome switch 230 is fixed to the upper surface of the substrate 210; The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240 and a through hole 250 at the center thereof to form a donut-shaped A dome terminal 260 is provided to be in contact with the substrate terminal 220; The groove button (100) is a cylindrical shape having a hollow (110) formed therein. The inner bottom surface of the hollow 110 is sealed and a lead wire outflow hole 120 is formed at the center. A bottom surface of the groove button 100 is seated on the flat portion 240; An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion. Similarly, the inner jaw 150 protrudes a certain length toward the center of the circle; A micro pump (130) is installed on the bottom surface of the hollow (110); An air tube (160) is installed at an upper portion of the micro pump (130) and connected to the micro pump (130); A microphone case 170 having a 'ㅗ' shape is seated on the air tube 160; A micro microphone (180) is embedded in the microphone case (170); A lower flange 172 is formed around the lower end of the microphone case 170; An elastic spring (190) is interposed between the inner flange (150) and the lower flange (172); The cradle 400 includes a base plate 410 and an upper surface of the base plate 410. The base plate 410 is disposed on the upper surface of the base plate 410, A hinge HIN provided on both side walls inserted at both ends of the mounting plate 420 while the both ends of the mounting plate 420 are inserted into the base plate 410, Type battery 440 which is detachably incorporated in the hinge HIN and selectively supplies electricity to the electromagnet coil 530 provided on the hinge HIN, A switch 450 installed on the base plate 410; and a seating table 460 hingedly mounted on the surface of the mounting plate 420 so as to be vertically installed; The hinge HIN includes an outer housing 510 fixed to both sides of one end of the accommodation plate receiving groove H1, a smaller diameter inner housing 520 assembled to the outer housing 510, A coil 530 installed in a space between the outer housing 510 and the inner housing 520 and a metal ring 540 fitted to the inner housing 520 and formed with a plurality of protrusion holes 542 A rubber ring 550 having a rubber projection 552 formed on the circumferential surface of the metal ring 540 and exposed through the projection hole 542 and having a rubber ring spline 554 formed on the inner circumference thereof, And a rotation shaft (560) protruding from both ends of the mounting plate (420) and having a shaft spline (562) engaged with the rubber ring spline (554). Lt; / RTI >

According to the present invention, the security level can be differentially set to the application or the folder of the information communication terminal, and the security level can be increased.

In addition, since the microphone can be implemented as an exposure type in the information communication terminal, it is possible to further enhance the voice recognition performance.

In addition, the blood circulation promoting material is applied to the back cover of the information communication terminal, thereby contributing to the health promotion of the user.

FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.
2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.
FIG. 2B is an exemplary view showing a shortcut icon for a folder or the like to which the first-level security is applied.
3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.
Fig. 4 is an exemplary view of an information communication terminal screen when the word completion method is used.
FIG. 5 is a diagram illustrating an example of a color input window popped up when the third-level security is set using the background color setting method of the present invention.
FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.
7 is an exemplary sectional view showing a microphone installation structure of an information communication terminal according to the present invention.
8 is an exemplary view of a built-in antenna of an information communication terminal according to the present invention.
9 is an exemplary view showing a cradle of an information communication terminal according to the present invention.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

Before describing the present invention, the following specific structural or functional descriptions are merely illustrative for the purpose of describing an embodiment according to the concept of the present invention, and embodiments according to the concept of the present invention may be embodied in various forms, And should not be construed as limited to the embodiments described herein.

In addition, since the embodiments according to the concept of the present invention can make various changes and have various forms, specific embodiments are illustrated in the drawings and described in detail herein. However, it should be understood that the embodiments according to the concept of the present invention are not intended to limit the present invention to specific modes of operation, but include all modifications, equivalents and alternatives falling within the spirit and scope of the present invention.

Prior to a specific description of the present invention, the security level setting method included in the system of the present invention follows the contents disclosed in the above-mentioned Japanese Patent No. 10-1320473. Therefore, the part related to the security procedure setting in the following description is disclosed in the registered patent, and the speech recognition technique is further described in relation to the information communication system to which the setting method is applied, or more precisely, the security level setting in the information communication terminal It also includes the microphone's flow structure to enhance speech recognition accuracy as a distinctive technical element.

The present invention is based on the idea that security levels are differentiated according to the importance of an application or a folder in order to effectively apply a security level to an application or a folder displayed on an information communication terminal.

The security level setting method of an information communication terminal according to the present invention is a security level setting method for a first level security that can identify an application or a folder, a second level security that can not identify an application or a folder, And third level security.

FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.

In the security level setting method of the information communication terminal according to the present invention, each security procedure can be collectively applied to an application or a folder (hereinafter referred to as a 'folder') individually or at a system administrator level.

First, whether the security step to be applied is an individual security for a folder or the like, or a batch security for an entire folder is selected (S100).

In the case of individual security, an attribute window such as a folder is activated (S110). If the security is bulk security, the system administrator is activated (S120).

Hereinafter, the first stage security to the third stage security is established. Since the same method is applied to the security step to be set whether individual security or bulk security, the case of individual security will be described below.

When a property window such as a folder is activated (S110), a security step to be applied to the first stage security or the second stage security is set to a folder (S200).

When the first level security is set, icons such as folders are identifiable (S210). When the security of the second level is set, icons such as folders are not identifiable (S220).

Next, a third-level security is selectively set in a folder in which a second-level security is set (S300). When the third-level security is set, a security procedure is additionally set (S310) If it is not set, the second stage security state is terminated.

The security procedures to be added in the third stage security are different from each other in the specific methods to be described later, but the basic ideas are the same.

If you enter the word, password, background color, border settings, and submit according to the security procedure selected in the security menu of the property window such as folder, setting is completed.

When a screen of the information communication terminal in which the security of the first stage security or the security of the third stage is set is turned on, an icon such as a folder corresponding to the corresponding security level is displayed. When a security procedure required by each security stage is passed, And the security is released.

Each security step is described in detail below.

2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.

The first step security is a security step in which a folder or the like is exposed and the inside of the icon 11 or the folder 13 of the application can be identified immediately when the screen is turned on to use the information communication terminal.

That is, the first stage security is a step of releasing security when the screen of the information communication terminal is turned on. It is a game which can be accessed by anyone, an icon for executing the Internet, a UCC that the user considers open even if the user opens it, Etc. are subject to the first stage security.

In many cases, when the screen of the information communication terminal is turned on, the security for the information communication terminal itself is often set by a password, a pattern drawing or the like. In the first stage security, security for the information communication terminal itself is preceded The state of the icon 11 of the application or the inside of the folder 13 can be identified when the screen of the information communication terminal is turned on.

Under the icon of the folder or the like in the first stage security, the name of the application or the folder is displayed by, for example, 'camera', 'utility', 'IMAGE', 'SNS'

Since the folder to which the first step security is applied should be able to provide the user with ease of driving, it is necessary to collect folders or the like to which the first step security is applied so that the user can directly recognize the information when the screen of the information communication terminal is turned on, The folder to which the application is applied, and the like can be opened.

FIG. 2B shows a shortcut icon 14 for directly accessing a page in which application icons 11 such as weather, stock price, YouTube, etc. to which the first-level security is applied and a folder to which the first- As shown in Fig.

2B, the user can execute applications such as weather, stock price, and YouTube without having to go through the initial security procedure of the information communication terminal. The user can directly open pages 1, 2, and 7 with the shortcut icon 14 can see.

3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.

The second level security is a security step in which a folder or the like is exposed but the icon of the application or the inside of the folder can not be identified even when the screen of the information communication terminal is turned on.

The second stage security is required because when a screen of the information communication terminal is turned on to execute a folder to which first level security is applied and the like, a folder which is not intended to be disclosed to others, such as an application including adult- So as to prevent exposure.

As an embodiment of the second stage security, there is a method in which a character 15 set by a user is displayed in the middle of an icon such as a folder or a method of replacing the icon with an image 17 or background color set by the user.

At this time, the name of the folder or the like disappears below the folder to which the second level security is applied.

Instead, the user may display a character or an image that can be associated only with the user on an icon such as a folder in order to facilitate the identification of the folder or the like having the second-level security.

The second stage security can not only identify the icon or the folder inside the application. To execute the application or open the folder, an icon such as a folder may be executed by a touch or the like.

In a device such as a smart TV, which is not a touch screen type, a cursor can be positioned on an icon of a folder or the like using a remote control and can be executed by a click method or the like.

The state after the security of the folder where the security of the second stage is applied is largely divided into two kinds.

First, the information communication terminal screen is in a state where it can identify the icon or the inside of the application in the same manner as the example of the screen of the information communication terminal applying the first step security in FIG. 2A. Second, If you want to make sure that you have selected the folder correctly, you can set the first method. If you want to reduce the number of touches or clicks, you can set the second method.

Since the third step security is a security process added to the second step security, the initial screen of the folder to which the third step security is applied is the same as that of the information communication terminal screen applying the second step security shown in FIG.

The difference between the third-level security and the second-level security is that, in the case of the second-level security, when an icon such as a folder is touched or clicked, the security is immediately released and the icon or the inside of the folder can be identified, Or a folder is opened. In the case of the third-level security, an application or a folder can be opened only after a separate security process is performed after a touch or a click.

Although there are various security procedures in the third step security, in the security level setting method of the information communication terminal according to the present invention, four methods of word completion, password input, background color setting, and border setting , 'Password setting method', 'background color setting method', and 'border setting method').

Hereinafter, the security procedure applied in the third step security of the present invention will be described in detail for each embodiment.

[Example 1]

The word completion method is similar to the second level security, in which a character set by a user is displayed in the middle of an icon of a folder or the like, or when the icon is replaced with an image set by the user, When the word is activated, the word completion window is opened and the application is executed or the folder is opened when the set word is completed.

For example, if the user sets the word " House " in the folder for the third level security, only 'H' is displayed in the center of the folder on the initial screen of the information communication terminal, You will be able to open the folder only if you fill out the word completion window and enter the remaining 'ouse'.

FIG. 4 illustrates a screen of the information communication terminal when the word completion method is used. The user activates an icon such as a folder by a method such as touch or click, and the word completion window 20 pops up. .

The advantage of the word completion method in comparison with the existing security procedures such as password input is that it provides the user with a hint about the security release.

Of course, there are some hints about unsecure, which makes it easier for others to access, but it is more convenient for users to easily remember their own password.

In general, the same password is set when not only folders but also e-mails, financial accounts, and other passwords are required because of the problem that it is easy to forget when using multiple passwords. In this case, even if only one password is leaked, Security can be compromised.

The word completion method of the present invention is intended to solve a problem that is easy to forget when a plurality of passwords are written by showing only a few letters of words.

In the example of 'House' above, if the folder is the folder where the house photos are stored, even if 'H' alone, the user who set 'House' can fill in the remaining 'ouse' It does not know whether it means 'Horse' or 'Hospital', and it is difficult to pass the security procedure.

Therefore, the user can increase the security level by setting different words for each application or folder.

That is, the word completion method of the present invention can increase the overall security level by allowing the user to set various words for each application or folder without increasing the possibility of security threats by others have.

[Example 2]

The password input method is the same as the security method through which a password is inputted when a screen of the information communication terminal is conventionally turned on or when a specific application is to be executed.

The password input method can be applied to easily detect the use of another person so that the information communication terminal can not be turned on (often called a " locked state ").

In general, when a password is set when the screen of the information communication terminal is turned on, a security means for preventing the information communication terminal from being turned on for a predetermined period of time such as 30 minutes or 1 hour when the password is incorrectly inputted consecutively three or more times Is used.

In the password input method of the present invention, the security by the conventional password is applied to a folder or the like. The difference from the conventional security by the password is the number which should not be inputted by the password. In other words, when setting the trap number, It is not only impossible to execute a folder or the like if the password is wrong, but it is characterized in that the information communication terminal can not be turned on immediately when a password number is input as a trap number that should not be inputted by a password.

For example, if the password set in the folder is 1234 and the number that should not be entered with the password is 9, if the other person executes a folder or the like and inputs a password including 9, the information communication terminal can be turned into a state in which the information communication terminal can not be turned on for a predetermined time have.

[Example 3]

The background color setting method is a method of setting a security procedure using the background color of an icon such as a folder in which characters set by a user are displayed.

The user can designate a background color to an icon such as a folder or the like. In the present background color setting method, a plurality of background colors are designated and it is determined that the security procedure has been passed when the specified plurality of background colors are input.

FIG. 5 illustrates a color input window 30 popped up when the third-level security is set using the background color setting method of the present invention.

The color input window may be a general CIE color diagram as shown in FIG. 5 (a) or a palette shape as shown in FIG. 5 (b) in which a plurality of colors set by the user are expressed. Is optional.

When setting the third level security using the background color setting method, one or more background colors designated by the user are security measures.

If two or more background colors are specified, the background color according to the background color setting method is determined to be a composite color of two or more background colors.

The background color setting method is based on the fact that it is difficult to find the background color before synthesizing from the synthesized background color. The user can specify the background color before synthesizing only the synthesized background color. However, It is very difficult to find out what colors were synthesized if several background colors were synthesized.

For example, when the CIE color chart is used as the color input window 30, if the user designates the point a of the red region and the point b of the green region as the background color, the background color of the folder, , It can be determined as the background color c on the line segment after ab in Fig. 5 (a).

The other person can see the background color c, but it is difficult to find a and b by looking at c because the color that can synthesize the background color c can be very diverse such as a1-b1 and a2-b2.

On the other hand, the user can easily find a and b because he or she sets the background color, so there is no difficulty in passing the security procedure.

In this respect, the security level by the background color setting method can increase dramatically as the number of background colors increases to three, four, or more.

When the user desires to activate the icon of the folder or the like by activating the background color setting method, the CIE color diagram or palette used for the security setting by the background color setting method is popped up again and the background color is inputted from the user Can be performed.

[Example 4]

The user can specify the shape of the border of the icon such as a folder or the like. The border setting method of the present invention is a method of setting a security procedure according to a pattern in which a user rotates a vertex of an icon frame 12.

FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.

As shown in FIG. 6 (a), icons such as a folder to which the border setting method is applied are in a state in which the edges of a triangle, a rectangle, a hexagon, an octagon, and the like are set.

The security setting by the border setting method is enabled by touching one of the vertices of the icon frame 12 such as a folder and rotating clockwise or counterclockwise.

For example, as shown in FIG. 6 (b), the right vertex of the regular hexagon is touched and rotated in the clockwise direction, the left vertex of the regular hexagon is touched to rotate clockwise, The security setting is completed.

In order to execute a folder or the like, the security can be released by touching the vertex of the icon frame 12 such as a folder in the same manner as the security setting and rotating clockwise or counterclockwise.

One of the 'word completion method', 'password input method', 'background color setting method' and 'frame setting method' of the first to fourth embodiments may be used in the third step security setting, It can also be used for a three-step security configuration.

For example, if the 'word completion method' and 'background color setting method' are combined, the user first sets the background color through the color input window after completing the word set through the word input window, .

As described above, the first step security, the second step security, and the third step security of the security level setting method of the information communication terminal according to the present invention may be collectively applied to the entire folders through the system manager of the information communication terminal, Folders or the like.

In addition, the background color setting method or the frame setting method described in the third and fourth embodiments of the present invention may be set as a terminal security means for replacing a password input or a pattern drawing when the screen of the information communication terminal is turned on.

The present invention is configured to include a voice recognition technology in the information communication terminal to set a security function while including the above contents in a basic configuration.

At this time, the speech recognition technology uses a known speech recognition method, and is configured such that the security is released by checking whether the user's voice, more precisely the frequency band, is stored and matched.

For example, since the frequency bands in which a specific word is pronounced for each person are different, if a specific word, such as 'Mugunghwa' is pronounced and stored as a password, the password is released in response to only 'Mugunghwa' And the like.

Such a method is a technology already known and used in a smart phone or the like.

It should be noted, however, that the present invention is not intended to be technically protected by the speech recognition technology itself, but rather relates to a flow structure of a microphone which is indispensably required in voice recognition.

That is, as shown in FIG. 7 (a), a microphone (MIC) in the information communication terminal 10 is provided not only at the lower end of the terminal but also in a direction orthogonal to the screen.

Therefore, it is difficult to accurately obtain the pronunciation of the user when applying the speech recognition technology. The difficulty here is not the concept of not being able to acquire, but it means that the recognition rate is high due to the large amount of noise.

7 (b), the microphone 200 is built on the home button 100 of the information communication terminal 10 and can be raised and lowered. When the voice recognition function is activated, the home button 100 100), so that the pronunciation of the user can be obtained very accurately and the error occurrence rate is remarkably reduced.

To this end, the structure of the home button 100 is modified.

The home button 100 is installed on the lower side of the surface of the information communication terminal 10 and is pressed to switch to the initial screen.

In particular, the groove button 100 is generally formed in the form of a dome switch so that it can be elastically returned without a spring or a separate spring.

Although the present invention adopts the dome switch type as it is, the shape of the dome switch and the shape of the contact point of the terminal are deformed.

That is, the substrate terminal 220 is formed in conformity with the deformed structure on the substrate 210, and the substrate terminal 220 is formed in a circular shape, more specifically, a donut shape.

A dome switch 230 is fixed to the upper surface of the substrate 210. The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240, And a donut-shaped dome terminal 260 is provided around the lower end surface of the through-hole 250.

Accordingly, when the dome switch 230 is pressed by an external force, the dome terminal 260 is brought into contact with the substrate terminal 220 to switch the screen of the information communication terminal 10 to a home screen, that is, do.

Since the dome switch 230 has an approximately dome-like shape extending toward both ends with respect to the center as shown in the drawing, the dome switch 230 naturally has an elastic return force and provides a click feeling to the home button 100, And perform the same function.

On the other hand, the groove button 100 is a cylindrical shape having a hollow 110 formed therein, and the overall appearance of the groove button 100 is substantially in the shape of a cross.

Particularly, the inner bottom surface of the hollow 110 is sealed, a lead-out hole 120 is formed at the center, and a bottom surface of the groove button 100 is seated on the flat portion 240.

Here, the lead-out hole 120 is provided to provide a wiring space for supplying power to the micro-pump 130 or the like built in the hollow 110 including the microphone 200.

An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion of the groove button 140. The bracket 140 The inner jaw 150 is protruded by a predetermined length toward the center of the circle.

Therefore, if the home button 100 is molded integrally with the inner button 150, it may be difficult to install the built-in items to be described later, so that the groove button 100 is partially split and screwed together .

Therefore, when the upper segment portion having the inner jaws 150 formed thereon is screwed to the upper end of the lower segment portion after the internal parts are installed in the lower segment portion, the internal jaws 150 are hooked by the inner jaws 150, Can be installed.

The micro pump 130 is installed on the bottom surface of the hollow 110 and the air tube 160 is installed on the micro pump 130 to be connected to the micro pump 130, And a micro microphone 180 is embedded in the microphone case 170. The micro microphone 170 is mounted on the upper surface of the microphone case 170. [

Accordingly, the lower end flange 172 of the microphone case 170 is caught by the lower end of the inner jaw 150, so that the upper end opening of the groove button 100 can not be separated.

In addition, an elastic spring 190 is interposed between the inner jaw 150 and the lower flange 172 so that the microminiature microphone 180 is always loaded in the hollow 110 of the groove button 100 State.

In the present invention having such a configuration, when the voice recognition function is activated to set the security using the voice recognition technology or to release the set security, the micro-pump 130 is activated by receiving the signal at the same time.

Then, the air inside the hollow 110 is supplied to the air tube 160 to swell the air tube 160.

At this time, in order to smoothly supply the air, a hole (HOL) communicating with the hollow 110 is further formed in a part of the circumference of the groove button 100.

When the air tube 160 is inflated according to the air supply, the microphone case 170 is lifted and exposed to the upper end of the groove button 100.

Therefore, when the user utters the sound, the sound from the mouth is input directly in the vertical direction at the maximum, and the accuracy of the acquired pronunciation is enhanced. This improves the speech recognition rate.

When the voice recognition function is canceled, the micro-pump 130 stops driving, so that the air in the air tube 160 is automatically released. At the same time, due to the self weight of the microphone case 170 and the returning force of the elastic spring 190 The microphone case 170 smoothly returns to its original position.

In the present invention, considering the fact that the information communication terminal 10 is mainly a smart phone, the information communication terminal 10 is in contact with hands, pockets or faces for almost 24 hours except for sleeping, and includes a method for contributing to health promotion.

According to the present invention, a component capable of promoting blood circulation is coated on the surface of the back cover (BK, see FIG. 7) of the information communication terminal 10 to form a coating layer having a predetermined thickness, And stimulates the skin to promote blood circulation, thereby contributing to the health promotion of the user.

For this, 15 parts by weight of pegmatite powder, 5 parts by weight of platinum powder, 1 part by weight of apatite powder, 2 parts by weight of sulfur powder, and 1 part by weight of polytetrafluoroethylene were added to 100 parts by weight of polycarbonate resin as a main material of back cover (BK) 2 parts by weight of tourmaline powder, 3 parts by weight of Hosel leaf extract, 4 parts by weight of silicone oil, 2 parts by weight of tragacanth and 2 parts by weight of wollastonite powder.

At this time, the pegmatite is a known substance having a property of promoting blood circulation as is known, and in order to increase the effect, the pegmatite should have a particle size of 0.35 μm-1 μm. This pegmatite is a differentiated ore product of magma, also called gigantic granitic rock. It is a colored radioactive material and ore that can act pharmacologically. It is a mineral which contains 9 kinds of components favorable to human body among 20 kinds of components, It has far infrared ray radiation and antibacterial deodorizing function as material of radiator.

In the present invention, it is used as a main component to be mixed for activation of the body cell and promotion of blood circulation.

The platinum powder is a platinum colloidal material that is mainly used as a cosmetic ingredient and is known as a substance that promotes skin activation by preventing aging such as sagging or wrinkling of the skin and removing active oxygen. In addition, medicines have been reported to improve liver, heart disease, arteriosclerosis and diabetes. In the present invention, it is added to promote skin circulation and reduce skin irritation.

In addition, apatite is a hexagonal system of hexagonal or hexagonal crystals and has been used for fertilizing soil for a long time because it has a complex structure containing a large amount of phosphorus, nitrogen, calcium and magnesium. However, in the present invention, it is added because it has a large effect of contributing to formation of mucilage between pegmatite powder and water while providing nutrients to the skin when the skin is contacted for the blood-stimulating function.

In addition, sulfur is added in the present invention so that the sulfur is combined with harmful heavy metal ions or radioactive substances and discharged to the outside of the body. In particular, vegetable sulfur serves as a chelating agent, and the harmful substance is made into a chelate compound and discharged to the outside of the body.

Further, the tourmaline fine powder is a mineral belonging to the hexagonal system having a crystal structure such as crystal, and is known as a material which permanently generates electromagnetic waves having a wavelength band of approximately 4 to 14 microns.

It has been reported that electromagnetic waves in the wavelength band of 4 to 14 microns have been reported to activate cells of plants and plants, synthesize proteins, or purify polluted water.

The above-mentioned HAZEL Leaf Extract is extracted from leaf, which is used for medicinal purposes, in Witch Hazel (Hamamelis Virginiana), a kind of deciduous tree that lives in the subtropical zone, and has a deodorizing and antibacterial function.

In addition, the silicone oil not only enhances lubricity upon mixing with a resin but also is for a liquidization close to a colloid of the mixture, and the tragacantha is added as a kind of rubber component for viscosity control, Powdered wollastonite having needle-like needle-shaped structure is used because it increases tensile strength and flexural strength.

In order to confirm the effect of this coating layer, a resting period of 30 minutes with a back cover (BK) with a coating layer resulted in an average heart rate (tested for 4 men in their 40s) when the back cover (BK) 88, but the average heart rate increased to 98 when measured with a back cover (BK). At this time, the blood circulation measuring instrument was model SMART PLUSE, manufacturer Medico.

Through this, we were able to confirm the efficacy.

8, a metal band 300 is installed along a side surface of the information communication terminal 10, and a pair of energizing fin holes 310 (see FIG. 8) are formed on a lower surface of the metal band 300, And a conductive pin 320 is inserted in the conductive fin hole 310 to be electrically grounded with the substrate 210 to perform an antenna function.

The pattern antenna 330 is formed around the inner surface of the metal band 300 as shown in FIG.

The pattern antenna 330 is a known plane antenna and has a microstrip type.

Since the conventional planar antenna is mainly printed on the lower substrate of the information communication terminal 10 in the form of planes, the reception sensitivity is lowered and the antenna gain is decreased, It does not exist.

Accordingly, in the present invention, the metal band 300 can be applied to increase the antenna gain. Since the metal band 300 is banded over the entire circumference of the information communication terminal 10, Can be significantly improved.

In addition, the pattern antenna 330 is configured to have a pattern by printing a copper foil.

Since the received radio wave is directly transmitted to the substrate 210 on the energizing pin 320, the propagation loss can also be reduced.

In addition, when the information communication terminal 10 is used to view a movie or the like in a comfortable state, the conventional cradle is very thick and has a complicated fixed structure, so that the user is very likely to avoid the low cost.

In addition, there is an inconvenience in that a separate support base is required to be installed to adjust the angle of the base, and recently, the case base is disadvantageous in that the stability of the case is deteriorated.

Thus, the present invention also includes a cradle 400 of the type shown in FIG. 9, which has a very thin thickness and is structurally simplified.

The mounting plate 400 includes a base plate 410 and a mounting plate 420 which is accommodated on the upper surface of the base plate 410 and is coplanar with the mounting plate 420. Both ends of the mounting plate 420 are connected to the base plate 410, A hinge HIN provided on both side walls inserted in a state of being inserted into the base plate 410 and an electromagnet coil 530 detachably installed on both sides of the base plate 410 and provided on the hinge HIN. A switch 450 installed on the base plate 410 to selectively energize the electricity of the battery 440 and a switch 450 installed on the surface of the base plate 410 to selectively charge the battery 440. [ And a seat base 460 hinged to be vertically erected.

Accordingly, when the information communication terminal 10 is put on and used, the mounting plate 420 is set up to have a desired angle, and then the switch 450 is pressed to supply power.

Then, the coil 530 is activated and electrified so that the hinge (HIN) of the mounting plate 420 is fixed at a certain angle.

At this time, the base plate 410 is formed with a receiving plate receiving groove H1 so as to accommodate the receiving plate 420, and the upper end of the receiving plate holding groove H1 A finger groove H2 is further formed at the center and a seating seat accommodating groove H3 is further formed in a part of the upper surface of the seating plate 420 so as to accommodate the seating table 460. [

In addition, the hinge HIN includes an outer housing 510 fixed to both sides of one end of the accommodation plate receiving groove H1, a smaller diameter inner housing 520 assembled to the outer housing 510, A coil 530 installed in a space between the outer housing 510 and the inner housing 520 and a metal 530 fitted to the inner housing 520 and formed with a plurality of protrusion holes 542 And a rubber ring 550 having a rubber ring spline 554 formed on the circumferential surface thereof and having a rubber protrusion 552 formed on the ring 540 and exposed through the protrusion hole 542, And a rotating shaft 560 having a shaft spline 562 protruding from both ends of the mounting plate 420 and engaged with the rubber ring spline 554. [

At this time, the outer housing 510 is opened at one side, the other side is formed into a closed cylindrical shape, a screw hole 512 is formed at the center of the sealed side, and a pair of coil drawing- So that each end of the built-in coil 530 can be drawn out to be connected to the battery 440.

In addition, the inner housing 510 is formed in a cylindrical shape, which is opened only on one side, like the outer housing 510, and a plurality of locking holes 522 are formed around the inner housing 510 with a space therebetween. 512 and screwed together by screwing.

Accordingly, when the mounting plate 420 is rotated in the assembled state, the rotating shaft 560 integral with the rotating shaft 560 is rotated, and the rubber ring 550 splined to the rotating shaft 560 is rotated. Since the ring 550 is coupled to the metal ring 540, the metal ring 540 rotates.

Since the rubber protrusion 552 formed on the periphery of the rubber ring 550 protrudes through the protrusion hole 542 formed around the metal ring 540, the rubber protrusion 552 is stretched and deformed, and the inner protrusion of the inner housing 520 So that it can be fixed easily and quickly at a specific angle.

In addition, when the switch 450 is pressed, a magnetic force is formed through the coil 530, and the metal ring 540 is attracted to the magnetic force and fixed in position, so that the rotating shaft 560 integral with the switch is naturally fixed .

That is, it is fixed by the rubber protrusion 552, but it is fixed again by the magnetic force of the coil 530 functioning as an electromagnet, so that the rotation shaft 560 can be securely fixed, and the fixing stability is increased.

With such a structure, when the seating table 460 is placed, the information communication terminal 10 can be easily and stably mounted.

Particularly, since such a structure can be made very thin, it is convenient to carry and is inexpensive to manufacture.

10 Information communication terminal 11 Application icon
12 Icon border 13 Folder
14 Shortcut Icon 15 Characters
17 images 20 word completion window
30 color input window

Claims (1)

A step S300 of setting a security level to be applied to the application or folder in the first stage security or a second stage security in step S200 and a step S300 in which the third stage security is selectively set in the application or folder in the second- And setting a password by voice recognition. When the first step security is set, an icon of an application or folder is identifiable (S210). When the second step security is set, an icon of an application or a folder is displayed (S220). The first step security is a security step of releasing security when a screen of the information communication terminal is turned on, and the third step security is a security step of not only an application or folder set in the second step security, (S310), the information communication terminal (10) comprising:
A donut-shaped substrate terminal 220 is formed on the substrate 210 in order to charge the micro-microphone 200 used in performing the password setting by the voice recognition into the home button 100 of the information communication terminal 10 ; A dome switch 230 is fixed to the upper surface of the substrate 210; The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240 and a through hole 250 at the center thereof to form a donut-shaped A dome terminal 260 is provided to be in contact with the substrate terminal 220; The groove button (100) is a cylindrical shape having a hollow (110) formed therein. The inner bottom surface of the hollow 110 is sealed and a lead wire outflow hole 120 is formed at the center. A bottom surface of the groove button 100 is seated on the flat portion 240; An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion. Similarly, the inner jaw 150 protrudes a certain length toward the center of the circle; A micro pump (130) is installed on the bottom surface of the hollow (110); An air tube (160) is installed at an upper portion of the micro pump (130) and connected to the micro pump (130); A microphone case 170 having a 'ㅗ' shape is seated on the air tube 160; A micro microphone (180) is embedded in the microphone case (170); A lower flange 172 is formed around the lower end of the microphone case 170; An elastic spring (190) is interposed between the inner flange (150) and the lower flange (172); The cradle 400 includes a base plate 410 and an upper surface of the base plate 410. The base plate 410 is disposed on the upper surface of the base plate 410, A hinge HIN provided on both side walls inserted at both ends of the mounting plate 420 while the both ends of the mounting plate 420 are inserted into the base plate 410, Type battery 440 which is detachably incorporated in the hinge HIN and selectively supplies electricity to the electromagnet coil 530 provided on the hinge HIN, A switch 450 installed on the base plate 410; and a seating table 460 hingedly mounted on the surface of the mounting plate 420 so as to be vertically installed; The hinge HIN includes an outer housing 510 fixed to both sides of one end of the mounting plate receiving groove H1, an inner housing 520 having a smaller diameter assembled to the outer housing 510, A coil 530 installed in a space between the inner housing 520 and the inner housing 520 and a metal ring 540 fitted in the inner housing 520 and having a plurality of protruding holes 542 formed at a predetermined interval around the inner housing 520, A rubber ring 550 having a rubber projection 552 formed on the circumferential surface of the metal ring 540 and exposed through the projection hole 542 and a rubber ring spline 554 formed on the inner circumference of the rubber ring 550, And a rotation shaft (560) protruding from both ends of the mounting plate (420) and having a shaft spline (562) engaged with the rubber ring spline (554).

KR1020160024507A 2016-02-29 2016-02-29 Information communication terminal that implements a security device KR101645300B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160024507A KR101645300B1 (en) 2016-02-29 2016-02-29 Information communication terminal that implements a security device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160024507A KR101645300B1 (en) 2016-02-29 2016-02-29 Information communication terminal that implements a security device

Publications (1)

Publication Number Publication Date
KR101645300B1 true KR101645300B1 (en) 2016-08-03

Family

ID=56708804

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160024507A KR101645300B1 (en) 2016-02-29 2016-02-29 Information communication terminal that implements a security device

Country Status (1)

Country Link
KR (1) KR101645300B1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000066299A (en) * 1999-04-15 2000-11-15 이정훈 Variable length handphones
KR100768042B1 (en) * 2006-11-23 2007-10-17 삼성전자주식회사 Portable terminal with protrusion type mic module
KR20130006265U (en) * 2012-04-21 2013-10-30 고영림 portable mobile phone stand combind with mirror
KR101320473B1 (en) 2012-04-25 2013-11-21 김성은 Method for setting up security level of information and communication device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000066299A (en) * 1999-04-15 2000-11-15 이정훈 Variable length handphones
KR100768042B1 (en) * 2006-11-23 2007-10-17 삼성전자주식회사 Portable terminal with protrusion type mic module
KR20130006265U (en) * 2012-04-21 2013-10-30 고영림 portable mobile phone stand combind with mirror
KR101320473B1 (en) 2012-04-25 2013-11-21 김성은 Method for setting up security level of information and communication device

Similar Documents

Publication Publication Date Title
US10606226B2 (en) Method for controlling an external device and an electronic device therefor
CN108885498B (en) Electronic device and method for providing information in electronic device
US10402625B2 (en) Intelligent electronic device and method of operating the same
KR102468129B1 (en) Electronic device and manufacturing method thereof
KR102442098B1 (en) Electronic device including bended dispaly and image diaplaying method therethrough
KR102498451B1 (en) Electronic device and method for provideing information in the electronic device
CN108351696B (en) Electronic device comprising a plurality of displays and method of operating the same
KR102405446B1 (en) Antenna device and electronic device
KR102313898B1 (en) Wearable electronic device
EP4086861A1 (en) Method for acquiring biometric information and electronic device supporting the same
US20160085950A1 (en) Method and system for controlling usage rights and user modes based on face recognition
KR102486127B1 (en) Electronic device having key structure and manufacturing method thereof
CN108713185A (en) Electronic device and its display and the method for sending image
US20170094511A1 (en) Method of performing communication and electronic device supporting same
CN106257428A (en) For providing equipment and the method for the notice about wireless charging state
CN108351890A (en) Electronic device and its operating method
CN106250738A (en) For performing electronic installation and the method thereof of personal authentication
KR20160034744A (en) Key waterproof apparatus
US9983688B2 (en) Protective cover
CN106912190A (en) Electronic equipment including shielding construction
US10978844B2 (en) Pogo module and electronic device comprising same
CN109075424A (en) For sending the electronic device of electromagnetic wave along multiple directions
KR102256580B1 (en) Wearable Electronic Device Including Communication Circuit
CN108537018A (en) Carry out the method for the electronic equipment and operation electronic equipment of certification using biological information
KR20150082043A (en) Electronic device having waterproof structure

Legal Events

Date Code Title Description
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant