KR101651215B1 - System for setting up security level of information and communication device - Google Patents
System for setting up security level of information and communication device Download PDFInfo
- Publication number
- KR101651215B1 KR101651215B1 KR1020160024260A KR20160024260A KR101651215B1 KR 101651215 B1 KR101651215 B1 KR 101651215B1 KR 1020160024260 A KR1020160024260 A KR 1020160024260A KR 20160024260 A KR20160024260 A KR 20160024260A KR 101651215 B1 KR101651215 B1 KR 101651215B1
- Authority
- KR
- South Korea
- Prior art keywords
- security
- folder
- information communication
- communication terminal
- setting
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 81
- 239000000758 substrate Substances 0.000 claims description 27
- 239000011248 coating agent Substances 0.000 claims description 4
- 238000000576 coating method Methods 0.000 claims description 4
- 230000000994 depressogenic effect Effects 0.000 claims description 3
- WABPQHHGFIMREM-UHFFFAOYSA-N lead(0) Chemical compound [Pb] WABPQHHGFIMREM-UHFFFAOYSA-N 0.000 claims description 2
- 238000000034 method Methods 0.000 description 89
- 239000003086 colorant Substances 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000017531 blood circulation Effects 0.000 description 6
- 239000000843 powder Substances 0.000 description 6
- 239000000463 material Substances 0.000 description 5
- NINIDFKCEFEMDL-UHFFFAOYSA-N Sulfur Chemical compound [S] NINIDFKCEFEMDL-UHFFFAOYSA-N 0.000 description 4
- BASFCYQUMIYNBI-UHFFFAOYSA-N platinum Chemical compound [Pt] BASFCYQUMIYNBI-UHFFFAOYSA-N 0.000 description 4
- 238000005476 soldering Methods 0.000 description 4
- 239000011247 coating layer Substances 0.000 description 3
- 239000013078 crystal Substances 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000036541 health Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000001737 promoting effect Effects 0.000 description 3
- 239000000126 substance Substances 0.000 description 3
- 229910052717 sulfur Inorganic materials 0.000 description 3
- 239000011593 sulfur Substances 0.000 description 3
- IJGRMHOSHXDMSA-UHFFFAOYSA-N Atomic nitrogen Chemical compound N#N IJGRMHOSHXDMSA-UHFFFAOYSA-N 0.000 description 2
- 241000196324 Embryophyta Species 0.000 description 2
- 230000004913 activation Effects 0.000 description 2
- 230000000844 anti-bacterial effect Effects 0.000 description 2
- 229910052586 apatite Inorganic materials 0.000 description 2
- 230000001877 deodorizing effect Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 229910052500 inorganic mineral Inorganic materials 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 239000011707 mineral Substances 0.000 description 2
- VSIIXMUUUJUKCM-UHFFFAOYSA-D pentacalcium;fluoride;triphosphate Chemical compound [F-].[Ca+2].[Ca+2].[Ca+2].[Ca+2].[Ca+2].[O-]P([O-])([O-])=O.[O-]P([O-])([O-])=O.[O-]P([O-])([O-])=O VSIIXMUUUJUKCM-UHFFFAOYSA-D 0.000 description 2
- 229920002545 silicone oil Polymers 0.000 description 2
- 230000002194 synthesizing effect Effects 0.000 description 2
- 229910052613 tourmaline Inorganic materials 0.000 description 2
- 229940070527 tourmaline Drugs 0.000 description 2
- 239000011032 tourmaline Substances 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 239000010456 wollastonite Substances 0.000 description 2
- 229910052882 wollastonite Inorganic materials 0.000 description 2
- KRQUFUKTQHISJB-YYADALCUSA-N 2-[(E)-N-[2-(4-chlorophenoxy)propoxy]-C-propylcarbonimidoyl]-3-hydroxy-5-(thian-3-yl)cyclohex-2-en-1-one Chemical compound CCC\C(=N/OCC(C)OC1=CC=C(Cl)C=C1)C1=C(O)CC(CC1=O)C1CCCSC1 KRQUFUKTQHISJB-YYADALCUSA-N 0.000 description 1
- 206010003210 Arteriosclerosis Diseases 0.000 description 1
- 241000416162 Astragalus gummifer Species 0.000 description 1
- OYPRJOBELJOOCE-UHFFFAOYSA-N Calcium Chemical compound [Ca] OYPRJOBELJOOCE-UHFFFAOYSA-N 0.000 description 1
- 235000001543 Corylus americana Nutrition 0.000 description 1
- 240000007582 Corylus avellana Species 0.000 description 1
- 235000007466 Corylus avellana Nutrition 0.000 description 1
- 241000208680 Hamamelis mollis Species 0.000 description 1
- 241000208681 Hamamelis virginiana Species 0.000 description 1
- FYYHWMGAXLPEAU-UHFFFAOYSA-N Magnesium Chemical compound [Mg] FYYHWMGAXLPEAU-UHFFFAOYSA-N 0.000 description 1
- 229920000715 Mucilage Polymers 0.000 description 1
- OAICVXFJPJFONN-UHFFFAOYSA-N Phosphorus Chemical compound [P] OAICVXFJPJFONN-UHFFFAOYSA-N 0.000 description 1
- 206010040880 Skin irritation Diseases 0.000 description 1
- 229920001615 Tragacanth Polymers 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000032683 aging Effects 0.000 description 1
- 208000011775 arteriosclerosis disease Diseases 0.000 description 1
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 239000011575 calcium Substances 0.000 description 1
- 229910052791 calcium Inorganic materials 0.000 description 1
- 239000013522 chelant Substances 0.000 description 1
- 239000002738 chelating agent Substances 0.000 description 1
- 230000004087 circulation Effects 0.000 description 1
- 239000000084 colloidal system Substances 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 239000008406 cosmetic ingredient Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 206010012601 diabetes mellitus Diseases 0.000 description 1
- 235000012489 doughnuts Nutrition 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 208000019622 heart disease Diseases 0.000 description 1
- 229910001385 heavy metal Inorganic materials 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 150000002500 ions Chemical class 0.000 description 1
- 239000007788 liquid Substances 0.000 description 1
- 210000004185 liver Anatomy 0.000 description 1
- 239000011777 magnesium Substances 0.000 description 1
- 229910052749 magnesium Inorganic materials 0.000 description 1
- 239000000155 melt Substances 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 229910052757 nitrogen Inorganic materials 0.000 description 1
- 235000015097 nutrients Nutrition 0.000 description 1
- 229910052760 oxygen Inorganic materials 0.000 description 1
- 239000001301 oxygen Substances 0.000 description 1
- 239000002245 particle Substances 0.000 description 1
- 229910052698 phosphorus Inorganic materials 0.000 description 1
- 239000011574 phosphorus Substances 0.000 description 1
- 229910052697 platinum Inorganic materials 0.000 description 1
- 239000004417 polycarbonate Substances 0.000 description 1
- 229920005668 polycarbonate resin Polymers 0.000 description 1
- 239000004431 polycarbonate resin Substances 0.000 description 1
- -1 polytetrafluoroethylene Polymers 0.000 description 1
- 229920001343 polytetrafluoroethylene Polymers 0.000 description 1
- 239000004810 polytetrafluoroethylene Substances 0.000 description 1
- 102000004169 proteins and genes Human genes 0.000 description 1
- 108090000623 proteins and genes Proteins 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 239000012857 radioactive material Substances 0.000 description 1
- 239000000941 radioactive substance Substances 0.000 description 1
- 229920005989 resin Polymers 0.000 description 1
- 239000011347 resin Substances 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 239000011435 rock Substances 0.000 description 1
- 238000007665 sagging Methods 0.000 description 1
- 230000036556 skin irritation Effects 0.000 description 1
- 231100000475 skin irritation Toxicity 0.000 description 1
- 239000002689 soil Substances 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 229940116362 tragacanth Drugs 0.000 description 1
- 235000010487 tragacanth Nutrition 0.000 description 1
- 239000000196 tragacanth Substances 0.000 description 1
- 235000013311 vegetables Nutrition 0.000 description 1
- 229940118846 witch hazel Drugs 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
The present invention relates to a system for setting security level of information communication among information communication technologies, and more particularly, to a system for setting security level of information communication, To the system.
As is well known, information communication terminals, such as smart phones, tablet PCs, and smart TVs, which are currently spreading, are displayed with icons or folders of applications on the display, and users can execute applications by touch or open data files GUI (Graphic User Interface) is adopted.
In general, a user collects applications and files to be specifically managed, such as frequently used and privacy-related data, and manages them in a folder.
However, current security methods have some inefficiencies in terms of security level and ease of application operation.
First, the icon of the application is expressed by inherent image information considering the CI (corporate identity) of the application developer, the expression of the property of the application, and the aesthetic point of view.
Therefore, even if only the icon of the application is seen, the user can know which application is used and which content is mainly consumed.
Especially, when the icon of the application including contents such as SNS (social network service, social network service), financial transaction institution, map search service, and adult video contents is exposed recently, important information related to privacy is transmitted to another person It is likely to be leaked.
In addition, with the development of hardware for information communication terminals such as cameras and microphones, the dissemination of applications for contents production has been expanded. Therefore, UCC (User Created Contents, user created contents) of music and video, The case of being manufactured in information communication terminal is increasing.
Accordingly, in the past, the information communication terminal, which has merely served as a telephone or a PDA, plays a role of a content creation device, and needs to be enhanced in level of the PC environment. However, in the security of the current information communication terminal, And so on.
In conclusion, there is a problem that there is currently no way to take special measures on the level of security of ICT terminals, regarding the information related to privacy or the exposure of UCC.
Secondly, most information communication terminals currently prevent access by others, not the owner of the information communication terminal, by inputting a password or drawing a pattern on the initial screen.
However, there are some applications that do not have a risk of leakage of personal information or leaked out, so that there is no need for a separate security procedure. Even when these applications are executed, it is troublesome to go through security procedures.
For example, it is necessary to repeat the security procedure every time when an application such as an Angry Bird or a Tetris is frequently used, such as a game or an Internet search, but does not require security for others, have.
SUMMARY OF THE INVENTION The present invention has been made in view of the above-described problems in the prior art, and it is an object of the present invention to provide a method of setting security level of an information communication, There is a main purpose in providing the system.
It is another object of the present invention to provide a system including a function of setting a security level of information communication, more preferably, a device configuration capable of adjusting the height of a microphone so as to increase the voice recognition level in the information communication terminal.
According to an aspect of the present invention, there is provided a method of securing a security level to be applied to an application or a folder in a first stage security or a second stage security (S200) (S300) and a password setting step by voice recognition. When the first step security is set, an icon of an application or a folder is identifiable (S210) When the security of the second stage is established, the icon of the application or the folder becomes unidentifiable (S220), the security of the first stage security is released when the screen of the information communication terminal is turned on, In the
A donut-
According to the present invention, the security level can be differentially set to the application or the folder of the information communication terminal, and the security level can be increased.
In addition, since the microphone can be implemented as an exposure type in the information communication terminal, it is possible to further enhance the voice recognition performance.
In addition, the blood circulation promoting material is applied to the back cover of the information communication terminal, thereby contributing to the health promotion of the user.
FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.
2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.
FIG. 2B is an exemplary view showing a shortcut icon for a folder or the like to which the first-level security is applied.
3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.
Fig. 4 is an exemplary view of an information communication terminal screen when the word completion method is used.
FIG. 5 is a diagram illustrating an example of a color input window popped up when the third-level security is set using the background color setting method of the present invention.
FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.
7 is an exemplary sectional view showing a microphone installation structure of an information communication terminal, which is a system according to the present invention.
8 is an exemplary view showing an example of terminal assembly of a device mounted on a substrate of an information communication terminal which is a system according to the present invention.
9 is an exemplary view showing a cradle of an information communication terminal, which is a system according to the present invention.
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Before describing the present invention, the following specific structural or functional descriptions are merely illustrative for the purpose of describing an embodiment according to the concept of the present invention, and embodiments according to the concept of the present invention may be embodied in various forms, And should not be construed as limited to the embodiments described herein.
In addition, since the embodiments according to the concept of the present invention can make various changes and have various forms, specific embodiments are illustrated in the drawings and described in detail herein. However, it should be understood that the embodiments according to the concept of the present invention are not intended to limit the present invention to specific modes of operation, but include all modifications, equivalents and alternatives falling within the spirit and scope of the present invention.
Prior to a specific description of the present invention, the security level setting method included in the system of the present invention follows the contents disclosed in the above-mentioned Japanese Patent No. 10-1320473. Therefore, the part related to the security procedure setting in the following description is disclosed in the registered patent, and the speech recognition technique is further described in relation to the information communication system to which the setting method is applied, or more precisely, the security level setting in the information communication terminal It also includes the microphone's flow structure to enhance speech recognition accuracy as a distinctive technical element.
The present invention is based on the idea that security levels are differentiated according to the importance of an application or a folder in order to effectively apply a security level to an application or a folder displayed on an information communication terminal.
The security level setting method of an information communication terminal according to the present invention is a security level setting method for a first level security that can identify an application or a folder, a second level security that can not identify an application or a folder, And third level security.
FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.
In the security level setting method of the information communication terminal according to the present invention, each security procedure can be collectively applied to an application or a folder (hereinafter referred to as a 'folder') individually or at a system administrator level.
First, whether the security step to be applied is an individual security for a folder or the like, or a batch security for an entire folder is selected (S100).
In the case of individual security, an attribute window such as a folder is activated (S110). If the security is bulk security, the system administrator is activated (S120).
Hereinafter, the first stage security to the third stage security is established. Since the same method is applied to the security step to be set whether individual security or bulk security, the case of individual security will be described below.
When a property window such as a folder is activated (S110), a security step to be applied to the first stage security or the second stage security is set to a folder (S200).
When the first level security is set, icons such as folders are identifiable (S210). When the security of the second level is set, icons such as folders are not identifiable (S220).
Next, a third-level security is selectively set in a folder in which a second-level security is set (S300). When the third-level security is set, a security procedure is additionally set (S310) If it is not set, the second stage security state is terminated.
The security procedures to be added in the third stage security are different from each other in the specific methods to be described later, but the basic ideas are the same.
If you enter the word, password, background color, border settings, and submit according to the security procedure selected in the security menu of the property window such as folder, setting is completed.
When a screen of the information communication terminal in which the security of the first stage security or the security of the third stage is set is turned on, an icon such as a folder corresponding to the corresponding security level is displayed. When a security procedure required by each security stage is passed, And the security is released.
Each security step is described in detail below.
2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.
The first step security is a security step in which a folder or the like is exposed and the inside of the
That is, the first stage security is a step of releasing security when the screen of the information communication terminal is turned on. It is a game which can be accessed by anyone, an icon for executing the Internet, a UCC that the user considers open even if the user opens it, Etc. are subject to the first stage security.
In many cases, when the screen of the information communication terminal is turned on, the security for the information communication terminal itself is often set by a password, a pattern drawing or the like. In the first stage security, security for the information communication terminal itself is preceded The state of the
Under the icon of the folder or the like in the first stage security, the name of the application or the folder is displayed by, for example, 'camera', 'utility', 'IMAGE', 'SNS'
Since the folder to which the first step security is applied should be able to provide the user with ease of driving, it is necessary to collect folders or the like to which the first step security is applied so that the user can directly recognize the information when the screen of the information communication terminal is turned on, The folder to which the application is applied, and the like can be opened.
FIG. 2B shows a
2B, the user can execute applications such as weather, stock price, and YouTube without having to go through the initial security procedure of the information communication terminal. The user can directly
3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.
The second level security is a security step in which a folder or the like is exposed but the icon of the application or the inside of the folder can not be identified even when the screen of the information communication terminal is turned on.
The second stage security is required because when a screen of the information communication terminal is turned on to execute a folder to which first level security is applied and the like, a folder which is not intended to be disclosed to others, such as an application including adult- So as to prevent exposure.
As an embodiment of the second stage security, there is a method in which a
At this time, the name of the folder or the like disappears below the folder to which the second level security is applied.
Instead, the user may display a character or an image that can be associated only with the user on an icon such as a folder in order to facilitate the identification of the folder or the like having the second-level security.
The second stage security can not only identify the icon or the folder inside the application. To execute the application or open the folder, an icon such as a folder may be executed by a touch or the like.
In a device such as a smart TV, which is not a touch screen type, a cursor can be positioned on an icon of a folder or the like using a remote control and can be executed by a click method or the like.
The state after the security of the folder where the security of the second stage is applied is largely divided into two kinds.
First, the information communication terminal screen is in a state where it can identify the icon or the inside of the application in the same manner as the example of the screen of the information communication terminal applying the first step security in FIG. 2A. Second, If you want to make sure that you have selected the folder correctly, you can set the first method. If you want to reduce the number of touches or clicks, you can set the second method.
Since the third step security is a security process added to the second step security, the initial screen of the folder to which the third step security is applied is the same as that of the information communication terminal screen applying the second step security shown in FIG.
The difference between the third-level security and the second-level security is that, in the case of the second-level security, when an icon such as a folder is touched or clicked, the security is immediately released and the icon or the inside of the folder can be identified, Or a folder is opened. In the case of the third-level security, an application or a folder can be opened only after a separate security process is performed after a touch or a click.
Although there are various security procedures in the third step security, in the security level setting method of the information communication terminal according to the present invention, four methods of word completion, password input, background color setting, and border setting , 'Password setting method', 'background color setting method', and 'border setting method').
Hereinafter, the security procedure applied in the third step security of the present invention will be described in detail for each embodiment.
[Example 1]
The word completion method is similar to the second level security, in which a character set by a user is displayed in the middle of an icon of a folder or the like, or when the icon is replaced with an image set by the user, When the word is activated, the word completion window is opened and the application is executed or the folder is opened when the set word is completed.
For example, if the user sets the word " House " in the folder for the third level security, only 'H' is displayed in the center of the folder on the initial screen of the information communication terminal, You will be able to open the folder only if you fill out the word completion window and enter the remaining 'ouse'.
FIG. 4 illustrates a screen of the information communication terminal when the word completion method is used. The user activates an icon such as a folder by a method such as touch or click, and the
The advantage of the word completion method in comparison with the existing security procedures such as password input is that it provides the user with a hint about the security release.
Of course, there are some hints about unsecure, which makes it easier for others to access, but it is more convenient for users to easily remember their own password.
In general, the same password is set when not only folders but also e-mails, financial accounts, and other passwords are required because of the problem that it is easy to forget when using multiple passwords. In this case, even if only one password is leaked, Security can be compromised.
The word completion method of the present invention is intended to solve a problem that is easy to forget when a plurality of passwords are written by showing only a few letters of words.
In the example of 'House' above, if the folder is the folder where the house photos are stored, even if 'H' alone, the user who set 'House' can fill in the remaining 'ouse' It does not know whether it means 'Horse' or 'Hospital', and it is difficult to pass the security procedure.
Therefore, the user can increase the security level by setting different words for each application or folder.
That is, the word completion method of the present invention can increase the overall security level by allowing the user to set various words for each application or folder without increasing the possibility of security threats by others have.
[Example 2]
The password input method is the same as the security method through which a password is inputted when a screen of the information communication terminal is conventionally turned on or when a specific application is to be executed.
The password input method can be applied to easily detect the use of another person so that the information communication terminal can not be turned on (often called a " locked state ").
In general, when a password is set when the screen of the information communication terminal is turned on, a security means for preventing the information communication terminal from being turned on for a predetermined period of time such as 30 minutes or 1 hour when the password is incorrectly inputted consecutively three or more times Is used.
In the password input method of the present invention, the security by the conventional password is applied to a folder or the like. The difference from the conventional security by the password is the number which should not be inputted by the password. In other words, when setting the trap number, It is not only impossible to execute a folder or the like if the password is wrong, but it is characterized in that the information communication terminal can not be turned on immediately when a password number is input as a trap number that should not be inputted by a password.
For example, if the password set in the folder is 1234 and the number that should not be entered with the password is 9, if the other person executes a folder or the like and inputs a password including 9, the information communication terminal can be turned into a state in which the information communication terminal can not be turned on for a predetermined time have.
[Example 3]
The background color setting method is a method of setting a security procedure using the background color of an icon such as a folder in which characters set by a user are displayed.
The user can designate a background color to an icon such as a folder or the like. In the present background color setting method, a plurality of background colors are designated and it is determined that the security procedure has been passed when the specified plurality of background colors are input.
FIG. 5 illustrates a
The color input window may be a general CIE color diagram as shown in FIG. 5 (a) or a palette shape as shown in FIG. 5 (b) in which a plurality of colors set by the user are expressed. Is optional.
When setting the third level security using the background color setting method, one or more background colors designated by the user are security measures.
If two or more background colors are specified, the background color according to the background color setting method is determined to be a composite color of two or more background colors.
The background color setting method is based on the fact that it is difficult to find the background color before synthesizing from the synthesized background color. The user can specify the background color before synthesizing only the synthesized background color. However, It is very difficult to find out what colors were synthesized if several background colors were synthesized.
For example, when the CIE color chart is used as the
The other person can see the background color c, but it is difficult to find a and b by looking at c because the color that can synthesize the background color c can be very diverse such as a1-b1 and a2-b2.
On the other hand, the user can easily find a and b because he or she sets the background color, so there is no difficulty in passing the security procedure.
In this respect, the security level by the background color setting method can increase dramatically as the number of background colors increases to three, four, or more.
When the user desires to activate the icon of the folder or the like by activating the background color setting method, the CIE color diagram or palette used for the security setting by the background color setting method is popped up again and the background color is inputted from the user Can be performed.
[Example 4]
The user can specify the shape of the border of the icon such as a folder or the like. The border setting method of the present invention is a method of setting a security procedure according to a pattern in which a user rotates a vertex of an
FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.
As shown in FIG. 6 (a), icons such as a folder to which the border setting method is applied are in a state in which the edges of a triangle, a rectangle, a hexagon, an octagon, and the like are set.
The security setting by the border setting method is enabled by touching one of the vertices of the
For example, as shown in FIG. 6 (b), the right vertex of the regular hexagon is touched and rotated in the clockwise direction, the left vertex of the regular hexagon is touched to rotate clockwise, The security setting is completed.
In order to execute a folder or the like, the security can be released by touching the vertex of the
One of the 'word completion method', 'password input method', 'background color setting method' and 'frame setting method' of the first to fourth embodiments may be used in the third step security setting, It can also be used for a three-step security configuration.
For example, if the 'word completion method' and 'background color setting method' are combined, the user first sets the background color through the color input window after completing the word set through the word input window, .
As described above, the first step security, the second step security, and the third step security of the security level setting method of the information communication terminal according to the present invention may be collectively applied to the entire folders through the system manager of the information communication terminal, Folders or the like.
In addition, the background color setting method or the frame setting method described in the third and fourth embodiments of the present invention may be set as a terminal security means for replacing a password input or a pattern drawing when the screen of the information communication terminal is turned on.
The present invention is configured to include a voice recognition technology in the information communication terminal to set a security function while including the above contents in a basic configuration.
At this time, the speech recognition technology uses a known speech recognition method, and is configured such that the security is released by checking whether the user's voice, more precisely the frequency band, is stored and matched.
For example, since the frequency bands in which a specific word is pronounced for each person are different, if a specific word, such as 'Mugunghwa' is pronounced and stored as a password, the password is released in response to only 'Mugunghwa' And the like.
Such a method is a technology already known and used in a smart phone or the like.
It should be noted, however, that the present invention is not intended to be technically protected by the speech recognition technology itself, but rather relates to a flow structure of a microphone which is indispensably required in voice recognition.
That is, as shown in FIG. 7 (a), a microphone (MIC) in the
Therefore, it is difficult to accurately obtain the pronunciation of the user when applying the speech recognition technology. The difficulty here is not the concept of not being able to acquire, but it means that the recognition rate is high due to the large amount of noise.
7 (b), the
To this end, the structure of the
The
In particular, the
Although the present invention adopts the dome switch type as it is, the shape of the dome switch and the shape of the contact point of the terminal are deformed.
That is, the
A
Accordingly, when the
Since the
On the other hand, the
Particularly, the inner bottom surface of the hollow 110 is sealed, a lead-out
Here, the lead-out
An upper portion of the
Therefore, if the
Therefore, when the upper segment portion having the
The
Accordingly, the
In addition, an
In the present invention having such a configuration, when the voice recognition function is activated to set the security using the voice recognition technology or to release the set security, the micro-pump 130 is activated by receiving the signal at the same time.
Then, the air inside the hollow 110 is supplied to the
At this time, in order to smoothly supply the air, a hole (HOL) communicating with the hollow 110 is further formed in a part of the circumference of the
When the
Therefore, when the user utters the sound, the sound from the mouth is input directly in the vertical direction at the maximum, and the accuracy of the acquired pronunciation is enhanced. This improves the speech recognition rate.
When the voice recognition function is canceled, the micro-pump 130 stops driving, so that the air in the
8, a plurality of SOAs are mounted on the
However, if this is done, the soldering operation must be troublesome, and if the soldering is wrong, the
Of course, in recent years, SMT equipment (automatic soldering machine) has been developed and automatically mounted as designed, but SMT equipment is a huge equipment and has a limitation that the investment cost is too high.
Also, such equipment sometimes causes defects. Moreover, such a mechanical facility causes damage continuously once it is found, unless the cause of the fault is found and measures are taken.
Therefore, the present invention includes technical features that are very simple and can be easily mounted.
According to the present invention, the terminal TR of the mounted SOA is immersed in the conductive paste so that the conductive wire paste is applied around the terminal TR and hardened.
Then, the terminal TR is inserted into the via hole VIA. In this state, hot air is applied to the upper surface of the
Thereafter, when cooled and cured, the insulating liquid is sprayed on the upper surface of the
Then, since the terminal TR is fixed very firmly by the insulating coating, it is not necessary to perform the soldering as before, the process is greatly simplified, and the investment cost is remarkably reduced, which is very effective.
On the other hand, according to the present invention, considering the fact that the
According to the present invention, a component capable of promoting blood circulation is coated on the surface of the back cover (BK, see FIG. 7) of the
For this, 15 parts by weight of pegmatite powder, 5 parts by weight of platinum powder, 1 part by weight of apatite powder, 2 parts by weight of sulfur powder, and 1 part by weight of polytetrafluoroethylene were added to 100 parts by weight of polycarbonate resin as a main material of back cover (BK) 2 parts by weight of tourmaline powder, 3 parts by weight of Hosel leaf extract, 4 parts by weight of silicone oil, 2 parts by weight of tragacanth and 2 parts by weight of wollastonite powder.
At this time, the pegmatite is a known substance having a property of promoting blood circulation as is known, and in order to increase the effect, the pegmatite should have a particle size of 0.35 μm-1 μm. This pegmatite is a differentiated ore product of magma, also called gigantic granitic rock. It is a colored radioactive material and ore that can act pharmacologically. It is a mineral which contains 9 kinds of components favorable to human body among 20 kinds of components, It has far infrared ray radiation and antibacterial deodorizing function as material of radiator.
In the present invention, it is used as a main component to be mixed for activation of the body cell and promotion of blood circulation.
The platinum powder is a platinum colloidal material that is mainly used as a cosmetic ingredient and is known as a substance that promotes skin activation by preventing aging such as sagging or wrinkling of the skin and removing active oxygen. In addition, medicines have been reported to improve liver, heart disease, arteriosclerosis and diabetes. In the present invention, it is added to promote skin circulation and reduce skin irritation.
In addition, apatite is a hexagonal system of hexagonal or hexagonal crystals and has been used for fertilizing soil for a long time because it has a complex structure containing a large amount of phosphorus, nitrogen, calcium and magnesium. However, in the present invention, it is added because it has a large effect of contributing to formation of mucilage between pegmatite powder and water while providing nutrients to the skin when the skin is contacted for the blood-stimulating function.
In addition, sulfur is added in the present invention so that the sulfur is combined with harmful heavy metal ions or radioactive substances and discharged to the outside of the body. In particular, vegetable sulfur serves as a chelating agent, and the harmful substance is made into a chelate compound and discharged to the outside of the body.
Further, the tourmaline fine powder is a mineral belonging to the hexagonal system having a crystal structure such as crystal, and is known as a material which permanently generates electromagnetic waves having a wavelength band of approximately 4 to 14 microns.
It has been reported that electromagnetic waves in the wavelength band of 4 to 14 microns have been reported to activate cells of plants and plants, synthesize proteins, or purify polluted water.
The above-mentioned HAZEL Leaf Extract is extracted from leaf, which is used for medicinal purposes, in Witch Hazel (Hamamelis Virginiana), a kind of deciduous tree that lives in the subtropical zone, and has a deodorizing and antibacterial function.
In addition, the silicone oil not only enhances lubricity upon mixing with a resin but also is for a liquidization close to a colloid of the mixture, and the tragacantha is added as a kind of rubber component for viscosity control, Powdered wollastonite having needle-like needle-shaped structure is used because it increases tensile strength and flexural strength.
In order to confirm the effect of this coating layer, a resting period of 30 minutes with a back cover (BK) with a coating layer resulted in an average heart rate (tested for 4 men in their 40s) when the back cover (BK) 88, but the average heart rate increased to 98 when measured with a back cover (BK). At this time, the blood circulation measuring instrument was model SMART PLUSE, manufacturer Medico.
Through this, we were able to confirm the efficacy.
In addition, when the user wants to enjoy a movie or the like in a comfortable state using the
Further, in order to adjust the angle of the cradle, there is an inconvenience that a separate cradle should be set up, and recently, the case-type cradle has a disadvantage that the stability is poor.
Accordingly, the present invention also includes a
The mounting table 300 includes a
Accordingly, when the
Then, the
The
In this state, when the seating table 360 is placed, the
Particularly, since such a structure can be made very thin, it is convenient to carry and is inexpensive to manufacture.
10
12
14
17
30 color input window
Claims (1)
A donut-shaped substrate terminal 220 is formed on the substrate 210 in order to charge the micro-microphone 200 used in performing the password setting by the voice recognition into the home button 100 of the information communication terminal 10 ; A dome switch 230 is fixed to the upper surface of the substrate 210; The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240 and a through hole 250 at the center thereof to form a donut-shaped A dome terminal 260 is provided to be in contact with the substrate terminal 220; The groove button (100) is a cylindrical shape having a hollow (110) formed therein. The inner bottom surface of the hollow 110 is sealed and a lead wire outflow hole 120 is formed at the center. A bottom surface of the groove button 100 is seated on the flat portion 240; An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion. Similarly, the inner jaw 150 protrudes a certain length toward the center of the circle; A micro pump (130) is installed on the bottom surface of the hollow (110); An air tube (160) is installed at an upper portion of the micro pump (130) and connected to the micro pump (130); A microphone case 170 having a 'ㅗ' shape is seated on the air tube 160; A micro microphone (180) is embedded in the microphone case (170); A lower flange 172 is formed around the lower end of the microphone case 170; An elastic spring (190) is interposed between the inner flange (150) and the lower flange (172); A conductive paste is attached to a terminal TR of a plurality of devices (SOAs) mounted on the substrate 210; The terminal TR is inserted into the via hole VIA of the substrate 210, and the conductive paste is melted by the hot air applied to the upper surface of the substrate 210 to improve the current conduction state; Wherein the insulating paste is sprayed on the upper surface of the substrate 210 after the conductive paste is cured so that a coating film having a thickness of more than 0 and less than 0.01 mm is formed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160024260A KR101651215B1 (en) | 2016-02-29 | 2016-02-29 | System for setting up security level of information and communication device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160024260A KR101651215B1 (en) | 2016-02-29 | 2016-02-29 | System for setting up security level of information and communication device |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101651215B1 true KR101651215B1 (en) | 2016-08-25 |
Family
ID=56884866
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160024260A KR101651215B1 (en) | 2016-02-29 | 2016-02-29 | System for setting up security level of information and communication device |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101651215B1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101320473B1 (en) | 2012-04-25 | 2013-11-21 | 김성은 | Method for setting up security level of information and communication device |
KR20140082410A (en) * | 2012-12-24 | 2014-07-02 | 현대자동차주식회사 | Speech guidence control method, speech recognition control method, and speech processing system |
-
2016
- 2016-02-29 KR KR1020160024260A patent/KR101651215B1/en active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101320473B1 (en) | 2012-04-25 | 2013-11-21 | 김성은 | Method for setting up security level of information and communication device |
KR20140082410A (en) * | 2012-12-24 | 2014-07-02 | 현대자동차주식회사 | Speech guidence control method, speech recognition control method, and speech processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10402625B2 (en) | Intelligent electronic device and method of operating the same | |
US20160085950A1 (en) | Method and system for controlling usage rights and user modes based on face recognition | |
CN108885498B (en) | Electronic device and method for providing information in electronic device | |
CN108351697B (en) | Electronic device including a plurality of displays and method for operating the same | |
EP4086861A1 (en) | Method for acquiring biometric information and electronic device supporting the same | |
CN108351696B (en) | Electronic device comprising a plurality of displays and method of operating the same | |
CN104423703B (en) | For showing the electronic equipment and method of application message | |
CN108351890B (en) | Electronic device and operation method thereof | |
EP3540727A1 (en) | Electronic device for outputting message and method for controlling the same | |
KR102361814B1 (en) | Electronic apparatus and method for providing information for avoiding ultraviolet | |
CN107688407A (en) | Electronic equipment with fingerprint sensor | |
CN108696631A (en) | Method and its electronic equipment for providing content corresponding with accessory device | |
US20130179472A1 (en) | Context Dependent Application/Event Activation for People with Various Cognitive Ability Levels | |
CN106912190A (en) | Electronic equipment including shielding construction | |
JP2016512622A (en) | Context-sensitive application / event launch for people with various cognitive levels | |
TR200101976T2 (en) | System and method for making the program guide information suitable for private use for the participation of the reminder part or the local identity. | |
CN106250738A (en) | For performing electronic installation and the method thereof of personal authentication | |
KR102395171B1 (en) | Method for displaying user interface and electronic device thereof | |
KR20170110469A (en) | A method for providing a video call and an electronic device therefor | |
KR102445719B1 (en) | Method and electronic device improving install speed of theme package | |
CN106445063A (en) | Method of managing application and electronic device therefor | |
KR20170012979A (en) | Electronic device and method for sharing image content | |
KR20150057307A (en) | Effect display method of electronic apparatus and electronic appparatus thereof | |
CN108460261A (en) | Method for managing content and its electronic equipment | |
CN105609355A (en) | Electronic device adopting key-waterproof structure and method for waterproofing key thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant | ||
FPAY | Annual fee payment |
Payment date: 20191007 Year of fee payment: 4 |