KR101651215B1 - System for setting up security level of information and communication device - Google Patents

System for setting up security level of information and communication device Download PDF

Info

Publication number
KR101651215B1
KR101651215B1 KR1020160024260A KR20160024260A KR101651215B1 KR 101651215 B1 KR101651215 B1 KR 101651215B1 KR 1020160024260 A KR1020160024260 A KR 1020160024260A KR 20160024260 A KR20160024260 A KR 20160024260A KR 101651215 B1 KR101651215 B1 KR 101651215B1
Authority
KR
South Korea
Prior art keywords
security
folder
information communication
communication terminal
setting
Prior art date
Application number
KR1020160024260A
Other languages
Korean (ko)
Inventor
박창현
윤갑구
Original Assignee
주식회사 에이스기술단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 에이스기술단 filed Critical 주식회사 에이스기술단
Priority to KR1020160024260A priority Critical patent/KR101651215B1/en
Application granted granted Critical
Publication of KR101651215B1 publication Critical patent/KR101651215B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention relates to a system for setting a security level of information communication and, more specifically, to a system for setting a security level of information communication which can discriminatively set security levels in an application or a folder of an information communication terminal to increase a security grade.

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention [0001]

The present invention relates to a system for setting security level of information communication among information communication technologies, and more particularly, to a system for setting security level of information communication, To the system.

As is well known, information communication terminals, such as smart phones, tablet PCs, and smart TVs, which are currently spreading, are displayed with icons or folders of applications on the display, and users can execute applications by touch or open data files GUI (Graphic User Interface) is adopted.

In general, a user collects applications and files to be specifically managed, such as frequently used and privacy-related data, and manages them in a folder.

However, current security methods have some inefficiencies in terms of security level and ease of application operation.

First, the icon of the application is expressed by inherent image information considering the CI (corporate identity) of the application developer, the expression of the property of the application, and the aesthetic point of view.

Therefore, even if only the icon of the application is seen, the user can know which application is used and which content is mainly consumed.

Especially, when the icon of the application including contents such as SNS (social network service, social network service), financial transaction institution, map search service, and adult video contents is exposed recently, important information related to privacy is transmitted to another person It is likely to be leaked.

In addition, with the development of hardware for information communication terminals such as cameras and microphones, the dissemination of applications for contents production has been expanded. Therefore, UCC (User Created Contents, user created contents) of music and video, The case of being manufactured in information communication terminal is increasing.

Accordingly, in the past, the information communication terminal, which has merely served as a telephone or a PDA, plays a role of a content creation device, and needs to be enhanced in level of the PC environment. However, in the security of the current information communication terminal, And so on.

In conclusion, there is a problem that there is currently no way to take special measures on the level of security of ICT terminals, regarding the information related to privacy or the exposure of UCC.

Secondly, most information communication terminals currently prevent access by others, not the owner of the information communication terminal, by inputting a password or drawing a pattern on the initial screen.

However, there are some applications that do not have a risk of leakage of personal information or leaked out, so that there is no need for a separate security procedure. Even when these applications are executed, it is troublesome to go through security procedures.

For example, it is necessary to repeat the security procedure every time when an application such as an Angry Bird or a Tetris is frequently used, such as a game or an Internet search, but does not require security for others, have.

Korea Patent Registration No. 10-1320473 (Oct. 15, 2013) 'How to Set Security Level of Information Communication Terminal'

SUMMARY OF THE INVENTION The present invention has been made in view of the above-described problems in the prior art, and it is an object of the present invention to provide a method of setting security level of an information communication, There is a main purpose in providing the system.

It is another object of the present invention to provide a system including a function of setting a security level of information communication, more preferably, a device configuration capable of adjusting the height of a microphone so as to increase the voice recognition level in the information communication terminal.

According to an aspect of the present invention, there is provided a method of securing a security level to be applied to an application or a folder in a first stage security or a second stage security (S200) (S300) and a password setting step by voice recognition. When the first step security is set, an icon of an application or a folder is identifiable (S210) When the security of the second stage is established, the icon of the application or the folder becomes unidentifiable (S220), the security of the first stage security is released when the screen of the information communication terminal is turned on, In the information communication terminal 10 having the form of setting a security procedure in addition to the application or folder with step security (S310) A system for setting a;

A donut-shaped substrate terminal 220 is formed on the substrate 210 in order to charge the micro-microphone 200 used in performing the password setting by the voice recognition into the home button 100 of the information communication terminal 10 ; A dome switch 230 is fixed to the upper surface of the substrate 210; The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240 and a through hole 250 at the center thereof to form a donut-shaped A dome terminal 260 is provided to be in contact with the substrate terminal 220; The groove button (100) is a cylindrical shape having a hollow (110) formed therein. The inner bottom surface of the hollow 110 is sealed and a lead wire outflow hole 120 is formed at the center. A bottom surface of the groove button 100 is seated on the flat portion 240; An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion. Similarly, the inner jaw 150 protrudes a certain length toward the center of the circle; A micro pump (130) is installed on the bottom surface of the hollow (110); An air tube (160) is installed at an upper portion of the micro pump (130) and connected to the micro pump (130); A microphone case 170 having a 'ㅗ' shape is seated on the air tube 160; A micro microphone (180) is embedded in the microphone case (170); A lower flange 172 is formed around the lower end of the microphone case 170; An elastic spring (190) is interposed between the inner flange (150) and the lower flange (172); A conductive paste is attached to a terminal TR of a plurality of devices (SOAs) mounted on the substrate 210; The terminal TR is inserted into the via hole VIA of the substrate 210, and the conductive paste is melted by the hot air applied to the upper surface of the substrate 210 to improve the current conduction state; The insulating paste is sprayed on the upper surface of the substrate 210 after the conductive paste is cured so that a coating film having a thickness of more than 0 and less than 0.01 mm is formed.

According to the present invention, the security level can be differentially set to the application or the folder of the information communication terminal, and the security level can be increased.

In addition, since the microphone can be implemented as an exposure type in the information communication terminal, it is possible to further enhance the voice recognition performance.

In addition, the blood circulation promoting material is applied to the back cover of the information communication terminal, thereby contributing to the health promotion of the user.

FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.
2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.
FIG. 2B is an exemplary view showing a shortcut icon for a folder or the like to which the first-level security is applied.
3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.
Fig. 4 is an exemplary view of an information communication terminal screen when the word completion method is used.
FIG. 5 is a diagram illustrating an example of a color input window popped up when the third-level security is set using the background color setting method of the present invention.
FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.
7 is an exemplary sectional view showing a microphone installation structure of an information communication terminal, which is a system according to the present invention.
8 is an exemplary view showing an example of terminal assembly of a device mounted on a substrate of an information communication terminal which is a system according to the present invention.
9 is an exemplary view showing a cradle of an information communication terminal, which is a system according to the present invention.

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

Before describing the present invention, the following specific structural or functional descriptions are merely illustrative for the purpose of describing an embodiment according to the concept of the present invention, and embodiments according to the concept of the present invention may be embodied in various forms, And should not be construed as limited to the embodiments described herein.

In addition, since the embodiments according to the concept of the present invention can make various changes and have various forms, specific embodiments are illustrated in the drawings and described in detail herein. However, it should be understood that the embodiments according to the concept of the present invention are not intended to limit the present invention to specific modes of operation, but include all modifications, equivalents and alternatives falling within the spirit and scope of the present invention.

Prior to a specific description of the present invention, the security level setting method included in the system of the present invention follows the contents disclosed in the above-mentioned Japanese Patent No. 10-1320473. Therefore, the part related to the security procedure setting in the following description is disclosed in the registered patent, and the speech recognition technique is further described in relation to the information communication system to which the setting method is applied, or more precisely, the security level setting in the information communication terminal It also includes the microphone's flow structure to enhance speech recognition accuracy as a distinctive technical element.

The present invention is based on the idea that security levels are differentiated according to the importance of an application or a folder in order to effectively apply a security level to an application or a folder displayed on an information communication terminal.

The security level setting method of an information communication terminal according to the present invention is a security level setting method for a first level security that can identify an application or a folder, a second level security that can not identify an application or a folder, And third level security.

FIG. 1 is a flowchart illustrating a method of setting a security level in the present invention.

In the security level setting method of the information communication terminal according to the present invention, each security procedure can be collectively applied to an application or a folder (hereinafter referred to as a 'folder') individually or at a system administrator level.

First, whether the security step to be applied is an individual security for a folder or the like, or a batch security for an entire folder is selected (S100).

In the case of individual security, an attribute window such as a folder is activated (S110). If the security is bulk security, the system administrator is activated (S120).

Hereinafter, the first stage security to the third stage security is established. Since the same method is applied to the security step to be set whether individual security or bulk security, the case of individual security will be described below.

When a property window such as a folder is activated (S110), a security step to be applied to the first stage security or the second stage security is set to a folder (S200).

When the first level security is set, icons such as folders are identifiable (S210). When the security of the second level is set, icons such as folders are not identifiable (S220).

Next, a third-level security is selectively set in a folder in which a second-level security is set (S300). When the third-level security is set, a security procedure is additionally set (S310) If it is not set, the second stage security state is terminated.

The security procedures to be added in the third stage security are different from each other in the specific methods to be described later, but the basic ideas are the same.

If you enter the word, password, background color, border settings, and submit according to the security procedure selected in the security menu of the property window such as folder, setting is completed.

When a screen of the information communication terminal in which the security of the first stage security or the security of the third stage is set is turned on, an icon such as a folder corresponding to the corresponding security level is displayed. When a security procedure required by each security stage is passed, And the security is released.

Each security step is described in detail below.

2A is an exemplary view of a screen of an information communication terminal to which the first-stage security is applied.

The first step security is a security step in which a folder or the like is exposed and the inside of the icon 11 or the folder 13 of the application can be identified immediately when the screen is turned on to use the information communication terminal.

That is, the first stage security is a step of releasing security when the screen of the information communication terminal is turned on. It is a game which can be accessed by anyone, an icon for executing the Internet, a UCC that the user considers open even if the user opens it, Etc. are subject to the first stage security.

In many cases, when the screen of the information communication terminal is turned on, the security for the information communication terminal itself is often set by a password, a pattern drawing or the like. In the first stage security, security for the information communication terminal itself is preceded The state of the icon 11 of the application or the inside of the folder 13 can be identified when the screen of the information communication terminal is turned on.

Under the icon of the folder or the like in the first stage security, the name of the application or the folder is displayed by, for example, 'camera', 'utility', 'IMAGE', 'SNS'

Since the folder to which the first step security is applied should be able to provide the user with ease of driving, it is necessary to collect folders or the like to which the first step security is applied so that the user can directly recognize the information when the screen of the information communication terminal is turned on, The folder to which the application is applied, and the like can be opened.

FIG. 2B shows a shortcut icon 14 for directly accessing a page in which application icons 11 such as weather, stock price, YouTube, etc. to which the first-level security is applied and a folder to which the first- As shown in Fig.

2B, the user can execute applications such as weather, stock price, and YouTube without having to go through the initial security procedure of the information communication terminal. The user can directly open pages 1, 2, and 7 with the shortcut icon 14 can see.

3 is an exemplary diagram of a screen of an information communication terminal to which the second level security is applied.

The second level security is a security step in which a folder or the like is exposed but the icon of the application or the inside of the folder can not be identified even when the screen of the information communication terminal is turned on.

The second stage security is required because when a screen of the information communication terminal is turned on to execute a folder to which first level security is applied and the like, a folder which is not intended to be disclosed to others, such as an application including adult- So as to prevent exposure.

As an embodiment of the second stage security, there is a method in which a character 15 set by a user is displayed in the middle of an icon such as a folder or a method of replacing the icon with an image 17 or background color set by the user.

At this time, the name of the folder or the like disappears below the folder to which the second level security is applied.

Instead, the user may display a character or an image that can be associated only with the user on an icon such as a folder in order to facilitate the identification of the folder or the like having the second-level security.

The second stage security can not only identify the icon or the folder inside the application. To execute the application or open the folder, an icon such as a folder may be executed by a touch or the like.

In a device such as a smart TV, which is not a touch screen type, a cursor can be positioned on an icon of a folder or the like using a remote control and can be executed by a click method or the like.

The state after the security of the folder where the security of the second stage is applied is largely divided into two kinds.

First, the information communication terminal screen is in a state where it can identify the icon or the inside of the application in the same manner as the example of the screen of the information communication terminal applying the first step security in FIG. 2A. Second, If you want to make sure that you have selected the folder correctly, you can set the first method. If you want to reduce the number of touches or clicks, you can set the second method.

Since the third step security is a security process added to the second step security, the initial screen of the folder to which the third step security is applied is the same as that of the information communication terminal screen applying the second step security shown in FIG.

The difference between the third-level security and the second-level security is that, in the case of the second-level security, when an icon such as a folder is touched or clicked, the security is immediately released and the icon or the inside of the folder can be identified, Or a folder is opened. In the case of the third-level security, an application or a folder can be opened only after a separate security process is performed after a touch or a click.

Although there are various security procedures in the third step security, in the security level setting method of the information communication terminal according to the present invention, four methods of word completion, password input, background color setting, and border setting , 'Password setting method', 'background color setting method', and 'border setting method').

Hereinafter, the security procedure applied in the third step security of the present invention will be described in detail for each embodiment.

[Example 1]

The word completion method is similar to the second level security, in which a character set by a user is displayed in the middle of an icon of a folder or the like, or when the icon is replaced with an image set by the user, When the word is activated, the word completion window is opened and the application is executed or the folder is opened when the set word is completed.

For example, if the user sets the word " House " in the folder for the third level security, only 'H' is displayed in the center of the folder on the initial screen of the information communication terminal, You will be able to open the folder only if you fill out the word completion window and enter the remaining 'ouse'.

FIG. 4 illustrates a screen of the information communication terminal when the word completion method is used. The user activates an icon such as a folder by a method such as touch or click, and the word completion window 20 pops up. .

The advantage of the word completion method in comparison with the existing security procedures such as password input is that it provides the user with a hint about the security release.

Of course, there are some hints about unsecure, which makes it easier for others to access, but it is more convenient for users to easily remember their own password.

In general, the same password is set when not only folders but also e-mails, financial accounts, and other passwords are required because of the problem that it is easy to forget when using multiple passwords. In this case, even if only one password is leaked, Security can be compromised.

The word completion method of the present invention is intended to solve a problem that is easy to forget when a plurality of passwords are written by showing only a few letters of words.

In the example of 'House' above, if the folder is the folder where the house photos are stored, even if 'H' alone, the user who set 'House' can fill in the remaining 'ouse' It does not know whether it means 'Horse' or 'Hospital', and it is difficult to pass the security procedure.

Therefore, the user can increase the security level by setting different words for each application or folder.

That is, the word completion method of the present invention can increase the overall security level by allowing the user to set various words for each application or folder without increasing the possibility of security threats by others have.

[Example 2]

The password input method is the same as the security method through which a password is inputted when a screen of the information communication terminal is conventionally turned on or when a specific application is to be executed.

The password input method can be applied to easily detect the use of another person so that the information communication terminal can not be turned on (often called a " locked state ").

In general, when a password is set when the screen of the information communication terminal is turned on, a security means for preventing the information communication terminal from being turned on for a predetermined period of time such as 30 minutes or 1 hour when the password is incorrectly inputted consecutively three or more times Is used.

In the password input method of the present invention, the security by the conventional password is applied to a folder or the like. The difference from the conventional security by the password is the number which should not be inputted by the password. In other words, when setting the trap number, It is not only impossible to execute a folder or the like if the password is wrong, but it is characterized in that the information communication terminal can not be turned on immediately when a password number is input as a trap number that should not be inputted by a password.

For example, if the password set in the folder is 1234 and the number that should not be entered with the password is 9, if the other person executes a folder or the like and inputs a password including 9, the information communication terminal can be turned into a state in which the information communication terminal can not be turned on for a predetermined time have.

[Example 3]

The background color setting method is a method of setting a security procedure using the background color of an icon such as a folder in which characters set by a user are displayed.

The user can designate a background color to an icon such as a folder or the like. In the present background color setting method, a plurality of background colors are designated and it is determined that the security procedure has been passed when the specified plurality of background colors are input.

FIG. 5 illustrates a color input window 30 popped up when the third-level security is set using the background color setting method of the present invention.

The color input window may be a general CIE color diagram as shown in FIG. 5 (a) or a palette shape as shown in FIG. 5 (b) in which a plurality of colors set by the user are expressed. Is optional.

When setting the third level security using the background color setting method, one or more background colors designated by the user are security measures.

If two or more background colors are specified, the background color according to the background color setting method is determined to be a composite color of two or more background colors.

The background color setting method is based on the fact that it is difficult to find the background color before synthesizing from the synthesized background color. The user can specify the background color before synthesizing only the synthesized background color. However, It is very difficult to find out what colors were synthesized if several background colors were synthesized.

For example, when the CIE color chart is used as the color input window 30, if the user designates the point a of the red region and the point b of the green region as the background color, the background color of the folder, , It can be determined as the background color c on the line segment after ab in Fig. 5 (a).

The other person can see the background color c, but it is difficult to find a and b by looking at c because the color that can synthesize the background color c can be very diverse such as a1-b1 and a2-b2.

On the other hand, the user can easily find a and b because he or she sets the background color, so there is no difficulty in passing the security procedure.

In this respect, the security level by the background color setting method can increase dramatically as the number of background colors increases to three, four, or more.

When the user desires to activate the icon of the folder or the like by activating the background color setting method, the CIE color diagram or palette used for the security setting by the background color setting method is popped up again and the background color is inputted from the user Can be performed.

[Example 4]

The user can specify the shape of the border of the icon such as a folder or the like. The border setting method of the present invention is a method of setting a security procedure according to a pattern in which a user rotates a vertex of an icon frame 12.

FIG. 6 is a diagram illustrating an example of a method of performing an information communication terminal screen and a border setting method when the frame setting method is applied.

As shown in FIG. 6 (a), icons such as a folder to which the border setting method is applied are in a state in which the edges of a triangle, a rectangle, a hexagon, an octagon, and the like are set.

The security setting by the border setting method is enabled by touching one of the vertices of the icon frame 12 such as a folder and rotating clockwise or counterclockwise.

For example, as shown in FIG. 6 (b), the right vertex of the regular hexagon is touched and rotated in the clockwise direction, the left vertex of the regular hexagon is touched to rotate clockwise, The security setting is completed.

In order to execute a folder or the like, the security can be released by touching the vertex of the icon frame 12 such as a folder in the same manner as the security setting and rotating clockwise or counterclockwise.

One of the 'word completion method', 'password input method', 'background color setting method' and 'frame setting method' of the first to fourth embodiments may be used in the third step security setting, It can also be used for a three-step security configuration.

For example, if the 'word completion method' and 'background color setting method' are combined, the user first sets the background color through the color input window after completing the word set through the word input window, .

As described above, the first step security, the second step security, and the third step security of the security level setting method of the information communication terminal according to the present invention may be collectively applied to the entire folders through the system manager of the information communication terminal, Folders or the like.

In addition, the background color setting method or the frame setting method described in the third and fourth embodiments of the present invention may be set as a terminal security means for replacing a password input or a pattern drawing when the screen of the information communication terminal is turned on.

The present invention is configured to include a voice recognition technology in the information communication terminal to set a security function while including the above contents in a basic configuration.

At this time, the speech recognition technology uses a known speech recognition method, and is configured such that the security is released by checking whether the user's voice, more precisely the frequency band, is stored and matched.

For example, since the frequency bands in which a specific word is pronounced for each person are different, if a specific word, such as 'Mugunghwa' is pronounced and stored as a password, the password is released in response to only 'Mugunghwa' And the like.

Such a method is a technology already known and used in a smart phone or the like.

It should be noted, however, that the present invention is not intended to be technically protected by the speech recognition technology itself, but rather relates to a flow structure of a microphone which is indispensably required in voice recognition.

That is, as shown in FIG. 7 (a), a microphone (MIC) in the information communication terminal 10 is provided not only at the lower end of the terminal but also in a direction orthogonal to the screen.

Therefore, it is difficult to accurately obtain the pronunciation of the user when applying the speech recognition technology. The difficulty here is not the concept of not being able to acquire, but it means that the recognition rate is high due to the large amount of noise.

7 (b), the microphone 200 is built on the home button 100 of the information communication terminal 10 and can be raised and lowered. When the voice recognition function is activated, the home button 100 100), so that the pronunciation of the user can be obtained very accurately and the error occurrence rate is remarkably reduced.

To this end, the structure of the home button 100 is modified.

The home button 100 is installed on the lower side of the surface of the information communication terminal 10 and is pressed to switch to the initial screen.

In particular, the groove button 100 is generally formed in the form of a dome switch so that it can be elastically returned without a spring or a separate spring.

Although the present invention adopts the dome switch type as it is, the shape of the dome switch and the shape of the contact point of the terminal are deformed.

That is, the substrate terminal 220 is formed in conformity with the deformed structure on the substrate 210, and the substrate terminal 220 is formed in a circular shape, more specifically, a donut shape.

A dome switch 230 is fixed to the upper surface of the substrate 210. The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240, And a donut-shaped dome terminal 260 is provided around the lower end surface of the through-hole 250.

Accordingly, when the dome switch 230 is pressed by an external force, the dome terminal 260 is brought into contact with the substrate terminal 220 to switch the screen of the information communication terminal 10 to a home screen, that is, do.

Since the dome switch 230 has an approximately dome-like shape extending toward both ends with respect to the center as shown in the drawing, the dome switch 230 naturally has an elastic return force and provides a click feeling to the home button 100, And perform the same function.

On the other hand, the groove button 100 is a cylindrical shape having a hollow 110 formed therein, and the overall appearance of the groove button 100 is substantially in the shape of a cross.

Particularly, the inner bottom surface of the hollow 110 is sealed, a lead-out hole 120 is formed at the center, and a bottom surface of the groove button 100 is seated on the flat portion 240.

Here, the lead-out hole 120 is provided to provide a wiring space for supplying power to the micro-pump 130 or the like built in the hollow 110 including the microphone 200.

An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion of the groove button 140. The bracket 140 The inner jaw 150 is protruded by a predetermined length toward the center of the circle.

Therefore, if the home button 100 is molded integrally with the inner button 150, it may be difficult to install the built-in items to be described later, so that the groove button 100 is partially split and screwed together .

Therefore, when the upper segment portion having the inner jaws 150 formed thereon is screwed to the upper end of the lower segment portion after the internal parts are installed in the lower segment portion, the internal jaws 150 are hooked by the inner jaws 150, Can be installed.

The micro pump 130 is installed on the bottom surface of the hollow 110 and the air tube 160 is installed on the micro pump 130 to be connected to the micro pump 130, And a micro microphone 180 is embedded in the microphone case 170. The micro microphone 170 is mounted on the upper surface of the microphone case 170. [

Accordingly, the lower end flange 172 of the microphone case 170 is caught by the lower end of the inner jaw 150, so that the upper end opening of the groove button 100 can not be separated.

In addition, an elastic spring 190 is interposed between the inner jaw 150 and the lower flange 172 so that the microminiature microphone 180 is always loaded in the hollow 110 of the groove button 100 State.

In the present invention having such a configuration, when the voice recognition function is activated to set the security using the voice recognition technology or to release the set security, the micro-pump 130 is activated by receiving the signal at the same time.

Then, the air inside the hollow 110 is supplied to the air tube 160 to swell the air tube 160.

At this time, in order to smoothly supply the air, a hole (HOL) communicating with the hollow 110 is further formed in a part of the circumference of the groove button 100.

When the air tube 160 is inflated according to the air supply, the microphone case 170 is lifted and exposed to the upper end of the groove button 100.

Therefore, when the user utters the sound, the sound from the mouth is input directly in the vertical direction at the maximum, and the accuracy of the acquired pronunciation is enhanced. This improves the speech recognition rate.

When the voice recognition function is canceled, the micro-pump 130 stops driving, so that the air in the air tube 160 is automatically released. At the same time, due to the self weight of the microphone case 170 and the returning force of the elastic spring 190 The microphone case 170 smoothly returns to its original position.

8, a plurality of SOAs are mounted on the substrate 210. Up to now, the terminal TR of the SOA has been inserted into a via hole VIA formed in the substrate 210, And then soldered to be fixed while ensuring conductivity.

However, if this is done, the soldering operation must be troublesome, and if the soldering is wrong, the entire substrate 210 is damaged.

Of course, in recent years, SMT equipment (automatic soldering machine) has been developed and automatically mounted as designed, but SMT equipment is a huge equipment and has a limitation that the investment cost is too high.

Also, such equipment sometimes causes defects. Moreover, such a mechanical facility causes damage continuously once it is found, unless the cause of the fault is found and measures are taken.

Therefore, the present invention includes technical features that are very simple and can be easily mounted.

According to the present invention, the terminal TR of the mounted SOA is immersed in the conductive paste so that the conductive wire paste is applied around the terminal TR and hardened.

Then, the terminal TR is inserted into the via hole VIA. In this state, hot air is applied to the upper surface of the substrate 210 to prevent the conduction failure from occurring while the conductive paste melts.

Thereafter, when cooled and cured, the insulating liquid is sprayed on the upper surface of the substrate 210 so that a coating film having a thickness of more than 0 and less than 0.01 mm is formed.

Then, since the terminal TR is fixed very firmly by the insulating coating, it is not necessary to perform the soldering as before, the process is greatly simplified, and the investment cost is remarkably reduced, which is very effective.

On the other hand, according to the present invention, considering the fact that the information communication terminal 10 is mainly a smart phone, it includes a method of contributing to health promotion because it is in contact with hands, pockets or faces for almost 24 hours except for sleeping.

According to the present invention, a component capable of promoting blood circulation is coated on the surface of the back cover (BK, see FIG. 7) of the information communication terminal 10 to form a coating layer having a predetermined thickness, And stimulates the skin to promote blood circulation, thereby contributing to the health promotion of the user.

For this, 15 parts by weight of pegmatite powder, 5 parts by weight of platinum powder, 1 part by weight of apatite powder, 2 parts by weight of sulfur powder, and 1 part by weight of polytetrafluoroethylene were added to 100 parts by weight of polycarbonate resin as a main material of back cover (BK) 2 parts by weight of tourmaline powder, 3 parts by weight of Hosel leaf extract, 4 parts by weight of silicone oil, 2 parts by weight of tragacanth and 2 parts by weight of wollastonite powder.

At this time, the pegmatite is a known substance having a property of promoting blood circulation as is known, and in order to increase the effect, the pegmatite should have a particle size of 0.35 μm-1 μm. This pegmatite is a differentiated ore product of magma, also called gigantic granitic rock. It is a colored radioactive material and ore that can act pharmacologically. It is a mineral which contains 9 kinds of components favorable to human body among 20 kinds of components, It has far infrared ray radiation and antibacterial deodorizing function as material of radiator.

In the present invention, it is used as a main component to be mixed for activation of the body cell and promotion of blood circulation.

The platinum powder is a platinum colloidal material that is mainly used as a cosmetic ingredient and is known as a substance that promotes skin activation by preventing aging such as sagging or wrinkling of the skin and removing active oxygen. In addition, medicines have been reported to improve liver, heart disease, arteriosclerosis and diabetes. In the present invention, it is added to promote skin circulation and reduce skin irritation.

In addition, apatite is a hexagonal system of hexagonal or hexagonal crystals and has been used for fertilizing soil for a long time because it has a complex structure containing a large amount of phosphorus, nitrogen, calcium and magnesium. However, in the present invention, it is added because it has a large effect of contributing to formation of mucilage between pegmatite powder and water while providing nutrients to the skin when the skin is contacted for the blood-stimulating function.

In addition, sulfur is added in the present invention so that the sulfur is combined with harmful heavy metal ions or radioactive substances and discharged to the outside of the body. In particular, vegetable sulfur serves as a chelating agent, and the harmful substance is made into a chelate compound and discharged to the outside of the body.

Further, the tourmaline fine powder is a mineral belonging to the hexagonal system having a crystal structure such as crystal, and is known as a material which permanently generates electromagnetic waves having a wavelength band of approximately 4 to 14 microns.

It has been reported that electromagnetic waves in the wavelength band of 4 to 14 microns have been reported to activate cells of plants and plants, synthesize proteins, or purify polluted water.

The above-mentioned HAZEL Leaf Extract is extracted from leaf, which is used for medicinal purposes, in Witch Hazel (Hamamelis Virginiana), a kind of deciduous tree that lives in the subtropical zone, and has a deodorizing and antibacterial function.

In addition, the silicone oil not only enhances lubricity upon mixing with a resin but also is for a liquidization close to a colloid of the mixture, and the tragacantha is added as a kind of rubber component for viscosity control, Powdered wollastonite having needle-like needle-shaped structure is used because it increases tensile strength and flexural strength.

In order to confirm the effect of this coating layer, a resting period of 30 minutes with a back cover (BK) with a coating layer resulted in an average heart rate (tested for 4 men in their 40s) when the back cover (BK) 88, but the average heart rate increased to 98 when measured with a back cover (BK). At this time, the blood circulation measuring instrument was model SMART PLUSE, manufacturer Medico.

Through this, we were able to confirm the efficacy.

In addition, when the user wants to enjoy a movie or the like in a comfortable state using the information communication terminal 10, the conventional cradle has a very thick thickness and a complicated fixing structure, so that the user is very likely to avoid the low cost.

Further, in order to adjust the angle of the cradle, there is an inconvenience that a separate cradle should be set up, and recently, the case-type cradle has a disadvantage that the stability is poor.

Accordingly, the present invention also includes a cradle 300 of the type shown in Fig. 9, which has a very thin thickness and is structurally simplified.

The mounting table 300 includes a base plate 310, a mounting plate 320 that is accommodated on the top surface of the base plate 310 and is coplanar with the mounting plate 320, A circular electromagnet 330 provided on the hinge and hinged to both sides of the inserted side wall in a state where the electromagnet 330 is inserted into the electromagnet 330 and the electromagnet 330 detachably installed on both sides of the base plate 310, A switch 350 installed on the base plate 310 for selectively energizing electricity of the battery 340 and a switch 350 installed on the surface of the mounting plate 320 And a mounting table 360 mounted hingedly and vertically installed.

Accordingly, when the information communication terminal 10 is put on and used, the mounting plate 320 is set up to have a desired angle, and then the switch 350 is pressed to supply electricity.

Then, the electromagnet 330 is activated, and the hinge (HIN) of the mounting plate 320 is attracted to the electromagnet 330 to be fixed in position. Here, the hinge (HIN) is of course a metal.

The protrusion groove 332 is formed in the inner diameter of the electromagnet 330 in a predetermined radius and the hinge protrusion DL protrudes from the protrusion groove 332 So as to enhance the fixing ability by using the attraction force by the magnetic force.

In this state, when the seating table 360 is placed, the information communication terminal 10 can be mounted very easily and stably.

Particularly, since such a structure can be made very thin, it is convenient to carry and is inexpensive to manufacture.

10 Information communication terminal 11 Application icon
12 Icon border 13 Folder
14 Shortcut Icon 15 Characters
17 images 20 word completion window
30 color input window

Claims (1)

A step S300 of setting a security level to be applied to the application or folder in the first stage security or a second stage security in step S200 and a step S300 in which the third stage security is selectively set in the application or folder in the second- And setting a password by voice recognition. When the first step security is set, an icon of an application or folder is identifiable (S210). When the second step security is set, an icon of an application or a folder is displayed (S220). The first step security is a security step of releasing security when a screen of the information communication terminal is turned on, and the third step security is a security step of not only an application or folder set in the second step security, Setting a security level of information communication in the information communication terminal 10 having the form of setting (S310);
A donut-shaped substrate terminal 220 is formed on the substrate 210 in order to charge the micro-microphone 200 used in performing the password setting by the voice recognition into the home button 100 of the information communication terminal 10 ; A dome switch 230 is fixed to the upper surface of the substrate 210; The dome switch 230 has a generally dome-shaped upper surface depressed at the center thereof to have a flat portion 240 and a through hole 250 at the center thereof to form a donut-shaped A dome terminal 260 is provided to be in contact with the substrate terminal 220; The groove button (100) is a cylindrical shape having a hollow (110) formed therein. The inner bottom surface of the hollow 110 is sealed and a lead wire outflow hole 120 is formed at the center. A bottom surface of the groove button 100 is seated on the flat portion 240; An upper portion of the groove button 100 is opened and a bracket 140 which is engaged with a lower surface of the upper case CA is formed at the upper end of the upper portion. Similarly, the inner jaw 150 protrudes a certain length toward the center of the circle; A micro pump (130) is installed on the bottom surface of the hollow (110); An air tube (160) is installed at an upper portion of the micro pump (130) and connected to the micro pump (130); A microphone case 170 having a 'ㅗ' shape is seated on the air tube 160; A micro microphone (180) is embedded in the microphone case (170); A lower flange 172 is formed around the lower end of the microphone case 170; An elastic spring (190) is interposed between the inner flange (150) and the lower flange (172); A conductive paste is attached to a terminal TR of a plurality of devices (SOAs) mounted on the substrate 210; The terminal TR is inserted into the via hole VIA of the substrate 210, and the conductive paste is melted by the hot air applied to the upper surface of the substrate 210 to improve the current conduction state; Wherein the insulating paste is sprayed on the upper surface of the substrate 210 after the conductive paste is cured so that a coating film having a thickness of more than 0 and less than 0.01 mm is formed.

KR1020160024260A 2016-02-29 2016-02-29 System for setting up security level of information and communication device KR101651215B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020160024260A KR101651215B1 (en) 2016-02-29 2016-02-29 System for setting up security level of information and communication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020160024260A KR101651215B1 (en) 2016-02-29 2016-02-29 System for setting up security level of information and communication device

Publications (1)

Publication Number Publication Date
KR101651215B1 true KR101651215B1 (en) 2016-08-25

Family

ID=56884866

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020160024260A KR101651215B1 (en) 2016-02-29 2016-02-29 System for setting up security level of information and communication device

Country Status (1)

Country Link
KR (1) KR101651215B1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101320473B1 (en) 2012-04-25 2013-11-21 김성은 Method for setting up security level of information and communication device
KR20140082410A (en) * 2012-12-24 2014-07-02 현대자동차주식회사 Speech guidence control method, speech recognition control method, and speech processing system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101320473B1 (en) 2012-04-25 2013-11-21 김성은 Method for setting up security level of information and communication device
KR20140082410A (en) * 2012-12-24 2014-07-02 현대자동차주식회사 Speech guidence control method, speech recognition control method, and speech processing system

Similar Documents

Publication Publication Date Title
US10402625B2 (en) Intelligent electronic device and method of operating the same
US20160085950A1 (en) Method and system for controlling usage rights and user modes based on face recognition
CN108885498B (en) Electronic device and method for providing information in electronic device
CN108351697B (en) Electronic device including a plurality of displays and method for operating the same
EP4086861A1 (en) Method for acquiring biometric information and electronic device supporting the same
CN108351696B (en) Electronic device comprising a plurality of displays and method of operating the same
CN104423703B (en) For showing the electronic equipment and method of application message
CN108351890B (en) Electronic device and operation method thereof
EP3540727A1 (en) Electronic device for outputting message and method for controlling the same
KR102361814B1 (en) Electronic apparatus and method for providing information for avoiding ultraviolet
CN107688407A (en) Electronic equipment with fingerprint sensor
CN108696631A (en) Method and its electronic equipment for providing content corresponding with accessory device
US20130179472A1 (en) Context Dependent Application/Event Activation for People with Various Cognitive Ability Levels
CN106912190A (en) Electronic equipment including shielding construction
JP2016512622A (en) Context-sensitive application / event launch for people with various cognitive levels
TR200101976T2 (en) System and method for making the program guide information suitable for private use for the participation of the reminder part or the local identity.
CN106250738A (en) For performing electronic installation and the method thereof of personal authentication
KR102395171B1 (en) Method for displaying user interface and electronic device thereof
KR20170110469A (en) A method for providing a video call and an electronic device therefor
KR102445719B1 (en) Method and electronic device improving install speed of theme package
CN106445063A (en) Method of managing application and electronic device therefor
KR20170012979A (en) Electronic device and method for sharing image content
KR20150057307A (en) Effect display method of electronic apparatus and electronic appparatus thereof
CN108460261A (en) Method for managing content and its electronic equipment
CN105609355A (en) Electronic device adopting key-waterproof structure and method for waterproofing key thereof

Legal Events

Date Code Title Description
E701 Decision to grant or registration of patent right
GRNT Written decision to grant
FPAY Annual fee payment

Payment date: 20191007

Year of fee payment: 4