Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information security system and information security method

A technology of information security and voice information, which is applied in telephone communication, equipment, voice analysis, etc., and can solve the problems that information security cannot meet people's needs

Inactive Publication Date: 2013-11-13
FU TAI HUA IND SHENZHEN +1
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem that the security of information in portable electronic devices cannot meet the needs of people in the prior art, it is necessary to provide an information security system that can satisfy the normal use of portable electronic devices and at the same time ensure the security of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security system and information security method
  • Information security system and information security method
  • Information security system and information security method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] see figure 1 , which is a schematic block diagram of an implementation of the information security system 100 of the present invention applied to the portable electronic device 10 . The information security system 100 runs in a portable electronic device 10 , and the portable electronic device 10 includes a processor 101 , a memory 102 and a recording device 103 . The recording device 103 is used for recording voice information input by the user into the portable electronic device 10 . The portable electronic device 10 described in this embodiment is described by taking a mobile phone as an example. In other embodiments of the present invention, the portable electronic device 10 may also be a tablet computer, a camera, etc., and is not limited thereto.

[0031] The information security system 100 is used to manage the functions of the portable electronic device 10 that can be used when the portable electronic device 10 releases the lock screen interface to enter the op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data secrecy system of an electronic device detects whether a screen unlocking interface of the electronic device is activated. The data secrecy system controls the recorder to record a phrase said by a user after the user is invited to speak. And then the data secrecy system extracts characteristics of the recorded phrase. The data secrecy system determines a privilege level for the user to access all or a part of functions of the electronic device according to the characteristics of the phrase, and controls the electronic device to work according to the determined privilege level of the user.

Description

technical field [0001] The invention relates to an information security system and an information security method applied in portable electronic equipment. Background technique [0002] As portable electronic devices are widely used in people's production and life, the security of personal information in portable electronic devices is becoming more and more important. For example, browsing pictures, photos, audio and video in mobile phones, web games, web browsing, and phone calls involving tariffs. However, in some occasions, the owner of the electronic device needs to lend the electronic device to others, or needs help from others to check certain information in the electronic device. Judging from the current security measures of electronic equipment information, it is mainly realized through the password lock screen of the portable electronic equipment. Part of the information will not be disclosed and the security requirements of the tariff. Contents of the invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725G10L15/26
CPCG06F21/32G06F21/31G06F2221/2113
Inventor 王引战张俊伟张军庄宗仁
Owner FU TAI HUA IND SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products