Device and method for preventing unauthorized use of information processing device

An information processing equipment and unauthorized technology, applied in the direction of unauthorized/fraudulent telephone prevention, branch equipment, selection device, etc., can solve the problems of inability to guarantee the security of boycotting information processing equipment, unaffordable passwords, etc.

Inactive Publication Date: 2009-01-07
LENOVO INNOVATIONS LTD HONG KONG
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the prior art cannot guarantee security against unauthorized use of information processing equipment
While passwords can be changed, frequent password changes become burdensome for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for preventing unauthorized use of information processing device
  • Device and method for preventing unauthorized use of information processing device
  • Device and method for preventing unauthorized use of information processing device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0021] refer to figure 1 , the portable telephone device 10 according to the first embodiment of the present invention is equipped with a controller 11 for controlling the entire operation of the portable telephone device 10 including control for preventing unauthorized use. The controller 11 may be a program-controlled processor such as a DSP (Digital Signal Processor), on which a control program as described later runs.

[0022] The portable telephone device 10 also has a wireless system 12 and a voice processor 13 for voice and data communication over a radio channel under the control of the controller 11 .

[0023] The speech processor 13 has a speaker (telephone handset) 13A and a microphone (telephone handset) 13B connected thereto. In the case of telephone communication, the data received by the microphone 13B is speech coded for transmission over the radio system 12 . In the case of user authentication, the input sound received by the microphone 13B is converted into...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An unauthorized use prevention apparatus of an information processing device is disclosed. When the information processing device starts, an arbitrary password is generated and a user is notified of the generated password. The user sounds out the password to enter a voice signal of the generated password. The voice signal of the password is verified with respect to both speech feature and password itself to determine whether an unauthorized person uses the information processing device.

Description

technical field [0001] The present invention relates to an information processing device with voice input and processing functions, and in particular to a technique for preventing unauthorized use of the information processing device. Background technique [0002] Utilizing higher-performance microprocessors, information processing equipment tends to be multifunctional. For example, personal information management functions such as address books can be provided to almost all portable communication devices such as portable telephone devices and PDA (Personal Digital Assistant) devices. In addition, through a portable communication device or a personal computer connected to the Internet, users can obtain fee-based services. [0003] When such a portable communication device falls into the hands of an unauthorized person, the unauthorized person can easily access not only important personal information of an authorized user but also paid services. Therefore, several security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/00G10L15/00H04L9/32H04Q7/32G06F15/02G06F1/00G06F3/16G06F21/00H04M1/67
CPCG06F21/32
Inventor 丸山茂
Owner LENOVO INNOVATIONS LTD HONG KONG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products