Method of controlling terminal using context awareness and terminal thereof

ABSTRACT

A method of controlling a terminal is provided. The method includes analyzing a sensed voice when a voice is sensed, recognizing a context based a result of the analysis, and performing a predetermined control operation based on the recognized context.

PRIORITY

The present disclosure is a continuation of U.S. patent application Ser.No. 14/405,083, which was filed on Dec. 2, 2014 and which claimspriority to PCT Application Ser. No. PCT/KR2013/005390, which was filedon Jun. 19, 2013, which claims priority to Korean Patent ApplicationSerial No. 10-2012-0070434, which was filed in the Korean IntellectualProperty Patent Office on Jun. 29, 2012, the entire contents of each ofthese applications is incorporated herein by reference.

TECHNICAL FIELD

The present invention relates to a method of controlling a terminalusing context awareness and a terminal thereof, and more particularly,to a method of controlling a terminal using context awareness whichrecognizes context through a sensed voice analysis and performs afunction control of the terminal according to the context, and aterminal thereof.

BACKGROUND ART

Generally, when user desires to restrict or block some functions of aterminal, user directly sets the function restriction by using a relatedsetting function. To this end, user may use a touch input, a voiceinput, etc.

However, when the terminal is used, a certain function may need to bepromptly restricted or reduced without user's specific setting. Forexample, when the terminal is temporarily handed over to another personand then used, an alarm function, etc. may need to be temporarilyblocked for private life protection.

DISCLOSURE OF INVENTION Technical Problem

At this time, separately restricting the alarm function by user beforethe terminal is handed over to the another person is inconvenient touser, and thus it is necessary for a function of a terminal to beautomatically restricted simultaneously when the terminal is handed overto another person.

Solution to Problem

The present invention has been made in view of the above problems, andprovides a method of controlling a terminal using context awareness thatrecognizes context of the terminal according to whether the terminal isused by a person who does not own the terminal, and a terminal thereof.

The present invention further provides a method of controlling aterminal using context awareness that recognizes context of a terminal,which controls the terminal operation such as recognizing the context ofthe terminal, blocking a certain function of the terminal or notdisplaying certain data.

In accordance with an aspect of the present invention, a method ofcontrolling a terminal includes: analyzing a sensed voice when a voiceis sensed; recognizing a context based a result of the analysis; andperforming a predetermined control operation based on the recognizedcontext. The preset control operation includes at least one of lockingmode setting, alarm blocking, certain function use blocking, datadisplay block and data deletion. The analyzing of the voice includes:sensing an externally generated voice; and analyzing at least one of apitch, a formant and an amplitude of the voice. The analyzing of thevoice includes: sensing a voice during performance of a callingfunction; terminating the calling function; and analyzing a voice sensedright before termination of the calling function. The recognizing of thecontext includes recognizing whether an owner of the terminal is usingthe terminal based on the result of the analysis. The recognizing of thecontext further includes recognizing at least one of whether theterminal is being used by an adult or a child and whether the terminalis being used by a man or a woman if the terminal is not being used bythe owner of the terminal. The performing of the control operationincludes blocking an alarm for at least one or a text message, anincoming call and a mobile messenger message.

The performing of the control operation includes blocking a use of atleast one of at least one application, payment function and keypad. Theperforming of the control operation includes blocking a display of atleast one of at least one menu, wallpaper icon and phone number storedin a phonebook. The performing of the control operation includesdeleting data on use details including at least one of a calling listand a text message transmission and reception list. In accordance withan aspect of the present invention, a method of controlling a terminalfurther includes: receiving a voice of an owner of the terminal;analyzing the voice of the owner; and storing owner voice informationbased on a result of analysis of the owner voice, wherein therecognizing of the situation comprises recognizing whether the terminalis being used by the owner based on the result of analysis and the ownervoice information. In accordance with an aspect of the presentinvention, a method of controlling a terminal further includes: settingin advance the control operation according to a user's input.

In accordance with another aspect of the present invention, a method ofcontrolling a terminal includes: receiving a voice of an owner of theterminal; analyzing the owner voice; storing the owner voice informationbased on a result of analysis on the owner voice; analyzing a sensedvoice when a voice is sensed; recognizing whether the terminal is beingused by the owner based on the result of the analysis and the ownervoice information; and performing a predetermined control operationbased on a result of the recognition.

In accordance with another aspect of the present invention, a terminalincludes: a voice input unit that receives a voice; and a controllerthat analyzes the voice received through the voice input unit,recognizes a context based on a result of the analysis, and performs apredetermined control operation. The predetermined control operationincludes at least one of locking mode setting, alarm blocking, certainfunction use blocking, data display blocking, and data deletion. Thevoice input unit includes a voice sensing unit that senses whether anexternal voice has occurred so that the voice input unit receives avoice only when the external voice occurs. The controller analyzes atleast one of a pitch, a formant and amplitude. The controller recognizesat least one of whether the terminal is being used by an owner of theterminal, whether the terminal is being used by an adult or a child, andwhether the terminal is being used by a man or a woman. In accordancewith another aspect of the present invention, a terminal furtherincludes: a storage unit that stores data, wherein the voice input unitreceives a voice of an owner of the terminal, and wherein the controllercontrols the storage unit to analyze the owner voice and storeinformation on the owner voice based on a result of the analysis on theowner voice. In accordance with another aspect of the present invention,a terminal further includes: a storage unit that stores data, whereinthe controller controls the controller to store the predeterminedcontrol operation.

Advantageous Effects of Invention

According to a method of controlling a terminal using context awarenessand a terminal thereof of the present invention, when a person who isnot an owner of the terminal uses the terminal, even though there is notspecific setting of user, the terminal function may be restricted orblocked according to the method desired by the owner. Further, accordingto a method of controlling a terminal using context awareness and aterminal thereof of the present invention, the voice is sensed andanalyzed so that the situation that the terminal has been handed over toa person who is not the terminal owner is sensed, and the blockingfunction is automatically controlled, thereby protecting privacy of userand allowing user to more easily use the terminal.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram illustrating a configuration of a terminalthat implements a control method according to the present invention;

FIG. 2 is a flowchart illustrating a method of inputting a voice of aterminal owner and setting a control operation according to the presentinvention;

FIG. 3 illustrates an example of a screen of a voice input by theterminal owner;

FIG. 4 illustrates an example of a screen of setting a controloperation;

FIG. 5 is a flowchart illustrating a method of controlling a terminalusing context awareness according to the present invention;

FIG. 6 is a flowchart illustrating a method of sensing a voice duringperformance of a calling function according to the present invention;

FIG. 7 is a flowchart illustrating a method of recognizing a contextaccording to the present invention;

FIG. 8 illustrates an example of a screen of setting a locking modeaccording to the present invention;

FIG. 9 illustrates an example of a screen of setting a locking mode whena call according to the present invention is terminated;

FIG. 10 illustrates an example of an alarm blocking screen according tothe present invention;

FIG. 11 illustrates an example of a screen of blocking a use of afunction according to the present invention;

FIG. 12 illustrates an example of a screen of blocking a display of dataaccording to the present invention;

FIG. 13 illustrates another example of a screen of blocking a display ofdata according to the present invention; and

FIG. 14 illustrates an example of a screen of deleting data according tothe present invention.

MODE FOR THE INVENTION

Exemplary embodiments of the present invention are described withreference to the accompanying drawings in detail. The same referencenumbers are used throughout the drawings to refer to the same or likeparts. Detailed descriptions of well-known functions and structuresincorporated herein may be omitted to avoid obscuring the subject matterof the present invention.

The present invention may be applied for context awareness and controlof a terminal according to recognized context.

Further, the present invention may be applied to all devices andservices that use context awareness as well as general electronicterminals such as a smartphone, a portable terminal, a mobile terminal,a personal digital assistant (PDA), a portable multimedia player (PMP),a notebook computer, a notepad, a Wibro terminal, a smart TV, a smartrefrigerator, etc.

FIG. 1 is a block diagram illustrating a configuration of a terminalthat implements a control method according to the present invention.

Referring to FIG. 1, a terminal 100 may include an input unit 110, asensor unit 120, a controller 130, a storage unit 140, and a displayunit 150.

The input unit 110 may receive user's operation signal for controllingoperation of the terminal 100. The input unit 110 may include a userinput unit 111 and a voice input unit 112.

The user input unit 111 may include a keypad, a dome switch, a touchpad, a jog wheel, a jog switch, etc. The user input unit 111 may besubstituted by a touch screen by the touch sensor unit 121 and thedisplay unit 150.

The voice input unit 112 may receive audio signals, and may include amicrophone, etc. The voice input unit 112 may receive external soundsignals by a microphone at a calling mode, a recording mode, a voicesensing mode, etc., and may process the received signals as electricvoice data. The processed voice data may be converted into atransmittable form and be outputted to the base station at the callingmode. The voice input unit 112 may implement various noise removingalgorithms for removing a noise generated in a process of receivingexternal sound signals.

The sensor unit 120 may include a touch sensor unit 121 and a voicesensing sensor unit 122.

The touch sensor unit 121 may sense a user's touch input. The touchsensor unit 121 may have a form of, for example, a touch film, a touchsheet, a touch pad, etc. The touch sensor unit 121 may sense a touchinput and transmit the sensed touch signal to the controller 120. Thecontroller 120 may analyze a touch signal and perform an operationcorresponding to the touch signal. Further, information corresponding tothe sensed touch signal may be outputted on the display unit 150. Thetouch sensor unit 121 may receive operation signals by may receiveoperation signals by a user's touch input by various input tools. Forexample, the touch sensor unit 121 may receive operation signals by auser's hand or a physical tool, a stylus pen, an operation button thatmay be included in the stylus pen, etc.

The voice sensing sensor unit 122 may automatically sense an externallygenerated voice. When a voice is externally generated, the voice sensingsensor unit 122 may transmit the voice to the controller 130 so that theterminal 100 may operate at the voice sensing mode. If the mode ischanged to the voice sensing mode by the voice sensing sensor unit 122,the terminal 100 may receive a voice through the voice input unit 112.

The controller 130 may control each of various components for overalloperation of the terminal 100. For example, the controller 130 mayrecognize a situation by analyzing a sensed voice, and control theterminal 100 to block the function of the terminal 100.

The controller 130 may includes a voice analysis unit 131 and a contextawareness unit 132.

If the voice sensed in the voice sensing sensor unit 122 is inputtedthrough the voice input unit 112, the voice analysis unit 131 mayanalyze the voice. The voice analysis unit 131 may analyze at least oneof a pitch, format and amplitude of the voice. The pitch may indicateperiodic characteristics of the voice. The voice analysis unit 131 mayanalyze periodic characteristics of the time axis using anauto-correlation function or may analyze periodic characteristics of thefrequency axis by acquiring the basic frequency based on the frequencyelements as a result of FFT.

Formant may indicate resonance characteristics of a vocal track that isgenerated by a voice. The voice analysis unit 131 may analyze theformant frequency by specifying the area where energy of a voice isconcentrated in the frequency domain.

Amplitude may denote intensity of a voice signal. The voice analysisunit 131 may analyze amplitude by sampling and acquiring the size byquantization and encoding.

The voice analysis unit 131 may analyze the gender, age, etc. of theperson who generates a voice through voice analysis.

A context awareness unit 132 may recognize the situation of the terminal100 based on the analysis result of the voice analysis unit 131.

According to an embodiment of the present invention, a controller 120may analyze a voice through the voice analysis unit 131 when a voice issensed, and may recognize the context based on the result of analysisthrough the context awareness unit 132. Further, the controller 120 mayperform preset control operation based on the recognized context.

The controller 130 will be described later in detail with reference tothe attached drawings.

A program or commands for the terminal 100 may be stored in the storageunit 140. The controller 130 may perform a program or commands stored inthe storage unit 140. The storage unit 140 may include a flash memorytype, a hard disk type, a multimedia card micro type, card type memory(e.g., SD or XD memory, etc.), a random access memory (RAM), a staticrandom access memory (SRAM), a read-only memory (ROM), an electricallyerasable programmable read-only memory (EEPROM), a programmableread-only memory (PROM), a magnetic memory, a magnetic disk, an opticaldisk, etc.

According to an embodiment of the present invention, the storage unit140 may store generated owner voice information based on the result ofanalysis on the owner voice analyzed through the voice analysis unit 131for the voice of the owner inputted through the voice input unit 112.

Further, according to an embodiment of the present invention, thestorage unit 140 may store a predetermined arbitrary control operationbased on the recognized context. That is, when an arbitrary situation(context) is recognized, the storage unit 140 may preset and storecontrol operation that may be performed by the terminal 100.

The display unit 150 displays (outputs) information processed in theterminal 100. For example, the display unit 150 may display a userinterface or a graphic user interface related with voice sensing,context awareness and function control.

The display unit 150 may operate as a touch screen by forming a layerstructure with a touch sensor unit 121. Here, the display unit 150 mayalso be used as an input device as well as an output device.

The touch sensor unit 121 may convert a change such as pressure andcapacitance applied to a certain area of the display unit 150 into anelectric input signal. The touch sensor unit 121 may be configured todetect a touch pressure as well as a touched location and area.

Components illustrated in FIG. 1 are not essential, and thus more orless components may be used to implement the terminal 100.

FIG. 2 is a flowchart illustrating a method of inputting a voice of aterminal owner and setting a control operation according to the presentinvention.

Referring to FIG. 2, the owner voice input and control operation settingmethod may be performed in an order described below.

First, the terminal 100 may determine whether a voice input request hasbeen generated (210).

The voice input request is a request for inputting a voice of the ownerof the terminal 100, and may be generated according to user's request orautomatically as is necessary. The terminal 100 may display an icon, amenu, etc. for receiving a voice input request.

If a voice input request is generated, the terminal 100 may receive aninput of the voice of the terminal owner (220).

The terminal 100 may display an icon, image, UI or GUI, etc. fornotifying a state where a voice is being inputted or a state where avoice is possible while a voice of the terminal owner is being inputted.For example, referring to FIG. 3, the terminal 100 may display an imageof a microphone shape and/or an icon (e.g., ⊙, etc.), a text image(e.g., REC, etc.) indicating that a voice is being inputted.

When a plurality of owners for the terminal 100 are recognized, theterminal 100 may receive an input of a voice for one of the owners. Inthis case, the terminal 100 may receive identification information ofthe owner. When the identification information of the owner is notreceived or it is impossible for the identification information to bereceived, the terminal 100 may set arbitrary identification informationfor the owner.

Next, the terminal 100 may analyze the owner's voice (230).

The terminal 100 may analyze the inputted voice of the owner. Theterminal 100 may analyze at least one of a pitch, formant and amplitudeof a voice of the owner. The terminal 100 may analyze periodiccharacteristics of the time axis using an auto-correlation function ormay analyze periodic characteristics of the frequency axis by acquiringthe basic frequency based on the frequency elements as a result of FFT.The terminal 100 may analyze the format frequency by specifying byspecifying the area where energy of a voice is concentrated in thefrequency domain. Further, the terminal 100 may analyze amplitude bysampling and acquiring the size by quantization and encoding.

The terminal 100 may analyze the gender, age, etc. of the terminal ownerthrough voice analysis.

The terminal 100 may perform a separate process such as a noiseelimination and sound amplification in order to increase accuracy forthe analysis of the owner's voice. Next, the terminal 100 may storevoice information of the owner (240).

The terminal 100 may store the owner's voice information based on theresult of analysis. The owner's voice information may contain the pitch,formant, amplitude of the acquired voice, gender and age of the personwho generates the voice, etc. The terminal 100 may store the voiceinformation of the owner in the form of a graph, digital data, analogdata, numbers, etc. according to the frequency or time domain.

When a plurality of owners of the terminal 100 are recognized as isnecessary, the terminal 100 may store voice information for a pluralityof users. At this time, the terminal 100 may store voice information foreach user along with identification information for a plurality ofusers.

The terminal 100 may determine whether a control operation settingrequest has been generated (250).

The terminal 100 may determine whether a control operation settingrequest for an arbitrary recognized context has occurred. The controloperation setting request may occur according to user's request orautomatically as is necessary. For example, the control operationsetting request may automatically occur after a voice input of the owneraccording to the voice input request.

When the control operation setting request occurs, the terminal 100 mayreceive an input of the control operation (260).

The terminal 100 may display a list, icon, related UI or GUI ofrecognized context in order to receive a control operation setting.Further, the terminal 100 may display a menu, a control operation list,icon, related UI or GUI for receiving an input of the control operation.For example, referring to FIG. 4, the terminal 100 may display a lockingmode, an alarm restriction, a data display restriction, a data deletion,etc. in a list as a control operation according to selection of a casewhere the recognized context is a situation of use of a user who is nota terminal owner. Further, the terminal 100 may display an icon and acheck box according to user's selection input or current controloperation setting state, or shaded control operation.

The terminal 100 may receive control operation for the recognizedcontext (situation) of the terminal 100. The recognized context may beone of whether used by the owner, whether used by an adult or a child,and whether used by a man or a woman. The terminal 100 may receivedifferent control operation according to the context. Next, the terminal100 may set control operation (270).

The terminal 100 may set control operation to be performed according tocontext awareness based on the inputted control operation. The controloperation may include at least one of locking mode setting, an alarmblock, a certain function use block, a data display block, datadeletion.

The terminal 100 may set control operation for the recognized context ofthe terminal 100. The recognized context may be at least one of whetherused by the owner, whether used by an adult or a child, and whether usedby a man or a woman. The terminal 100 may receive different controloperation according to the context. The terminal 100 may set differentcontrol operation according to the context.

When a plurality of owners of the terminal 100 are recognized, theterminal 100 may differently set control operation for each owner.

When there is no control operation setting request, the terminal 100 mayset the control operation as default (280).

For example, when the terminal 100 is not being used by the owner, theterminal 100 may be set to perform control operation that sets thelocking mode as default. Further, when the terminal 100 is used by achild, the terminal 100 may be set to perform control operation thatblocks the use of an application and keypad function that is charged asdefault.

FIG. 5 is a flowchart illustrating a method of controlling a terminalusing context awareness according to the present invention.

Referring to FIG. 5, a method of controlling a terminal using contextawareness may be performed in an order described below.

First, the terminal 100 may recognize whether a voice is sensed (310).

The terminal 100 may sense whether a voice is externally sensed troughthe voice sensing unit 122. The sensed voice may be a user's voice ofthe current terminal including the owner.

When the voice is sensed, the terminal 100 may analyze the voice (320).The terminal 100 may analyze the sensed voice. The terminal 100 mayanalyze at least one of a pitch, formant, amplitude of the sensed voice.The terminal 100 may analyze periodic characteristics of the time axisusing an auto-correlation function or may analyze periodiccharacteristics of the frequency axis by acquiring the basic frequencybased on the frequency elements as a result of FFT. The terminal 100 mayanalyze format frequencies by specifying the area where energy of avoice is concentrated in the frequency domain. Further, the terminal 100may analyze amplitude by sampling the voice signal and acquiring thesize by quantization and encoding.

The terminal 100 may analyze the gender, age, etc. of the current userof the terminal 100 through sound analysis.

The terminal 100 may perform a separate process such as a noise removal,sound amplitude, etc. in order to enhance accuracy for the soundanalysis of the owner.

The terminal 100 may sense the sound during the calling functionperformance and analyze the sensed sound.

Specifically, referring to FIG. 6, the terminal 100 may perform acalling function (321).

The terminal 100 may perform an outgoing call according to user'srequest or may perform an incoming call according to a receivingallowance request of user for a received call.

Next, the terminal 100 may sense the voice (322).

The terminal 100 may sense voice externally generated during performanceof a calling function. At this time, the sensed voice may be a user'svoice for performing a call. The sensed voice may be transmitted to thebase station through the signal processing according to the performanceof a calling function so as to be transmitted to the calling opponentterminal. Further, the sensed voice may be sampled or recorded accordingto whether a function additionally provided along with the callingfunction is used.

Next, the terminal 100 may determine whether the calling has beenterminated (323). The terminal 100 may determine whether the calling isterminated as the user's request or the signal transmission andreception with the base station becomes impossible.

When the calling is not terminated, the terminal 100 may continuallysense the voice. In contrast, when the calling is terminated, theterminal 100 may analyze the lastly sensed voice (324).

The terminal 100 may analyze the voice sensed right before the lastsensed voice, i.e., termination of the calling. As such, the terminal100 may determine whether the terminal 100 has been terminated toanother user, not the owner, right before the termination of thecalling. The function restriction for privacy protection may be achievedwhen a user other than the owner of the terminal 100 tries to use otherfunctions of the terminal 100.

Next, the terminal 100 may recognize context (330).

The terminal 100 may recognize the current situation of the terminal 100based on the result of analysis of the voice. The terminal 100 mayrecognize the owner's situation of use based on the result of voiceanalysis. Further, the terminal 100 may recognize at least one ofwhether used by the owner, whether used by an adult or a child, andwhether used by a man or a woman.

Specifically, referring to FIG. 7, the terminal 100 may recognizewhether the terminal 100 is being used by the owner (331).

he terminal 100 may recognize whether the current terminal 100 is beingused by the owner based on the result of voice analysis. That is, theterminal 100 may determine whether the sensed voice is the voice of theowner. The terminal 100 may recognize whether the terminal is used bythe owner by determining whether the sensed voice coincides with thevoice information of the owner as a result of analysis based on thepre-stored owner's voice information.

When the terminal is not being used by the owner, the terminal 100 mayrecognize whether the terminal is used by an adult or a child (332). Theterminal 100 may determine whether the current user of the terminal 100is an adult or a child. The terminal 100 may apply a preset thresholdvalue to the result of analysis in order to determine whether user is anadult or a child. For example, if the pitch is larger than the thresholdvalue as a result of the voice analysis, the terminal 100 may determinethat the user of the current terminal 100 is a child.

The terminal 100 may recognize whether the terminal 100 is being used byan adult or a child regardless of whether the terminal 100 is being usedby the owner as is necessary. Further, the terminal 100 may recognizewhether the terminal is being used by a man or a woman (333).

The terminal 100 may determine whether the current user of the terminal100 is a man or a woman. The terminal 100 may apply a preset thresholdvalue to the analyzed result in order to determine whether user is a manor a woman. For example, as a result of the voice analysis, if the pitchis greater than the threshold, the terminal 100 may determine that theuser is a woman.

The terminal 100 may recognize one situation or a combination of two ormore situations. For example, the terminal 100 may recognize whether thecurrent user of the terminal 100 is a man.

Next, the terminal 100 may perform control operation (340).

The terminal 100 may perform control operation based on the recognizedcontext (situation). The control operation may include at least one oflocking mode setting, alarm blocking, certain function use blocking,data display blocking, and data deletion. The control operation may bepreset as a default that is provided by user or in the terminal 100.

Specifically, the control operation may be an operation that sets thelocking mode. For example, referring to FIG. 8, as a result of the voiceanalysis, if the terminal 100 is being used by the owner of the terminal100, the locking mode of the terminal 100 may be set. The terminal 100may set the screen off mode, power-save mode, power off mode, etc.instead of setting the locking mode. The terminal 100 may display thelocking release UI, the password input UI, the pattern input UI, etc.according to the locking mode.

If the user including the owner of the terminal 100 inputs a password orpattern for releasing the locking mode, the terminal 100 may cancel thelocking mode and allow the use of the terminal 100.

Further, for example, referring to FIG. 9, the terminal 100 may analyzethe voice based on the voice recognized during the calling functionperformance, and when it is recognized that the user, not the owner,uses the terminal 100 at the time of terminating a call as a result ofanalysis of the voice, the locking mode may be set. As such, theterminal 100 may release the locking mode for calling, and may preventanother user from using the function of the terminal 100 according tothe locking mode release state after the termination of a call.

The control operation may be an operation for blocking the alarm.

The terminal 100 may block the alarm on reception of a text message, ane-mail, a phone call, a mobile messenger message, etc. based on therecognized situation. The object for blocking the alarm may be set inadvance by the user. The terminal 100 may block an unconfirmed textmessage, an unconfirmed e-mail, an unconfirmed mobile messenger message,an alarm for existence of a call during absence as well as a textmessage, an e-mail, a phone call, a mobile messenger message, etc. whichare received in real time. Further, the terminal 100 may block an alarmfor a text message, an e-mail, a phone call, and a mobile messengermessage which are received from a certain user using information storedin a phone book. The terminal 100 may block an alarm displayed on thedisplay unit 150 as well as an alarm that outputs vibration, sound, etc.

For example, referring to FIG. 10, as a result of analysis of the voice,when it is recognized that user who is not the owner is using theterminal, the terminal 100 may block an alarm on whether a text messagehas been received or there has been a phone call during absence.

The control operation may be an operation that blocks a use of a certainfunction.

The terminal 100 may block a use of an application and a service whichare provided in the terminal 100 based on the recognized context.Further, the terminal may block a use of an application, a service or atouch input which is charged, a keypad operation, a correction forarbitrary data, and a use of a deleting function.

For example, referring to FIG. 11, as a result of voice analysis, whenit is recognized that the user who is not the owner uses the terminal100, the terminal may block the use of a certain application.

At this time, the terminal 100 may display a message, icon, image, UI orGUI indicating that a use of an application has been blocked. Theterminal 100 may output a pop-up window, an alarm window, a sound, etc.in order to notify that a use of an application has been blocked.

Further, for example, when it is recognized that the terminal is beingused by a child who is not the owner, a calling function, a game and ause of an application that is charged may be blocked. Further, theterminal 100 may prevent a situation where the terminal 100 isarbitrarily operated by a child by blocking a use of a touch input or akeypad operation.

The terminal 100 may store information for a function such as anapplication and a service provided by the terminal 100 in order to blocka use of a certain function. For example, the terminal 100 may storeinformation on a function such as the name of the function, theidentifier, the location of the function execution file, supplierinformation and whether there is a function that is charged.

The control operation may be an operation that blocks a data display.

The terminal 100 may block a display of part or whole of data for aphone number, calling details, a text message list, an e-mail list, aphoto album, a memo, etc. stored in the terminal 100 based on therecognized situation. Further, the terminal 100 may block a display ofan icon, a menu, widget, UI, GUI, contents, etc. which are set to bedisplayed on the screen. The data that blocks the display may be set inadvance by user. The data that blocks the display may be set for acertain application or service such as a phone number, a photo album, amemo, etc. or may be individually set for data within a certainapplication or service.

The terminal 100 may rearrange a list or icons on a standby screen fordata other than data whose display has been blocked. That is, the layoutof the displayed data may be rearranged and displayed so that thelocation of the blocked data is not displayed empty. For example,referring to FIG. 12, when it is recognized that a user other than theowner is using the terminal as a result of the voice analysis, theterminal 100 may block a display for a part of information stored in thephone number list.

Further, for example, referring to FIG. 13, when it is recognized that auser other than the owner is using the terminal 100 as a result of thevoice analysis, a display of a part of icons which are set to bedisplayed on a standby screen may be blocked.

The terminal 100 may block a display of data in connection with theblocking of a use of a certain function. For example, when it isrecognized that the terminal 100 is being used by a child, the terminal100 may block a use of a calling and game application. Further, theterminal 100 may block a use of an application by blocking a display ofan icon of a calling and game application that is displayed on a standbyscreen.

The control operation may be a data deleting operation.

The terminal 100 may delete data stored in the terminal 100 based on therecognized context. The terminal 100 may delete history data including arecent use record, a list of an application or execution file that isunder operation, a calling record, and a purchasing record. Further, theterminal 100 may delete part or whole of data for a phone number, acalling record, a text message list, an e-mail list, a photo album, amemo, etc. which are stored in the terminal. Here, the terminal 100 mayprevent an output of important data when the terminal 100 is lostthrough data deletion.

For example, referring to FIG. 14, when it is recognized that a userother than the owner uses a terminal 100, the terminal 100 may delete ahistory list of recently operated applications.

The control operation of the above-described terminal 100 is not limitedto one operation, but may be operated by combining two or moreoperations according to a setting state inputted at the time ofmanufacturing the user's input or terminal 100.

Although exemplary embodiments of the present invention have beendescribed in detail hereinabove, it should be clearly understood thatmany variations and modifications of the basic inventive concepts hereintaught which may appear to those skilled in the present art will stillfall within the spirit and scope of the present invention, as defined inthe appended claims.

What is claimed is:
 1. A method of controlling a terminal, the methodcomprising: analyzing a voice when a voice is sensed by a microphone,which is controlled by a controller of the terminal; recognizing acontext based on a result of the analysis; and performing apredetermined control operation based on the recognized context, whereinperforming the predetermined control operation comprises blocking adisplay of at least one of an application and a phone number stored in aphonebook while displaying at least one of a graphical locking releaseuser interface, a graphical password input user interface, and agraphical pattern input user interface used for unblocking the display,and wherein the predetermined control operation includes data deletionthat is selectable from a displayed control operation list configured toreceive an input from a user.
 2. The method of claim 1, wherein thepredetermined control operation further includes at least one of lockingmode setting, alarm blocking, certain function use blocking.
 3. Themethod of claim 1, wherein the analyzing of the voice comprises: sensingan externally generated voice; and analyzing at least one of a pitch, aformant and an amplitude of the voice.
 4. The method of claim 1, whereinthe analyzing of the voice comprises: sensing a voice during performanceof a calling function; terminating the calling function; and analyzing avoice sensed right before termination of the calling function.
 5. Themethod of claim 1, wherein the recognizing of the context comprises:recognizing whether an owner of the terminal is using the terminal basedon the result of the analysis.
 6. The method of claim 5, wherein therecognizing of the context further comprises recognizing at least one ofwhether the terminal is being used by an adult or a child and whetherthe terminal is being used by a man or a woman if the terminal is notbeing used by the owner of the terminal.
 7. The method of claim 1,wherein performing the predetermined control operation further comprisesblocking an alarm for at least one of a text message, an incoming calland a mobile messenger message.
 8. The method of claim 1, whereinperforming the predetermined control operation further comprisesblocking a use of at least one of an application, a payment function anda keypad.
 9. The method of claim 1, wherein performing the predeterminedcontrol operation further comprises deleting data on use detailsincluding at least one of a calling list and a text message transmissionand reception list.
 10. The method of claim 1, further comprising:receiving a voice of an owner of the terminal; analyzing the voice ofthe owner; and storing owner voice information based on a result ofanalysis of the owner voice, wherein the recognizing of the contextcomprises recognizing whether the terminal is being used by the ownerbased on the result of analysis and the owner voice information.
 11. Themethod of claim 1, further comprising: setting in advance thepredetermined control operation according to a user's input.
 12. Amethod of controlling a terminal, the method comprising: receiving avoice of an owner of the terminal; analyzing the owner's voice; storingthe owner's voice information based on a result of the analysis of theowner's voice; analyzing a voice when a voice is sensed; recognizingwhether the terminal is being used by the owner based on the result ofthe analysis and the owner's voice information; and performing apredetermined control operation based on a result of the recognition,wherein performing the predetermined control operation comprisesblocking a display of at least one of an application and a phone numberstored in a phonebook while displaying at least one of a graphicallocking release user interface, a graphical password input userinterface, and a graphical pattern input user interface used forunblocking the display, and wherein the predetermined control operationincludes data deletion that is selectable from a displayed controloperation list configured to receive an input from a user.
 13. Aterminal comprising: a voice input unit that receives a voice; and acontroller configured to: analyze the voice received through the voiceinput unit; recognize a context based on a result of the analysis; andperform a predetermined control operation to block a display of at leastone of an application and a phone number stored in a phonebook whiledisplaying at least one of a graphical locking release user interface, agraphical password input user interface, and a graphical pattern inputuser interface used for unblocking the display, and wherein thepredetermined control operation includes data deletion that isselectable from a displayed control operation list configured to receivean input from a user.
 14. The terminal of claim 13, wherein thepredetermined control operation further includes at least one of lockingmode setting, alarm blocking, certain function use blocking.
 15. Theterminal of claim 13, wherein the voice input unit comprises a voicesensing unit that senses whether an external voice has occurred so thatthe voice input unit receives a voice only when the external voiceoccurs.
 16. The terminal of claim 13, wherein the controller is furtherconfigured to analyze at least one of a pitch, a formant and anamplitude.
 17. The terminal of claim 13, wherein the controller isfurther configured to recognize at least one of whether the terminal isbeing used by an owner of the terminal, whether the terminal is beingused by an adult or a child, and whether the terminal is being used by aman or a woman.
 18. The terminal of claim 13, further comprising: astorage unit that stores data, wherein the voice input unit receives avoice of an owner of the terminal, and wherein the controller is furtherconfigured to control the storage unit to analyze the owner's voice andstore information on the owner's voice based on a result of the analysison the owner's voice.
 19. The terminal of claim 13, further comprising:a storage unit that stores data, wherein the controller is furtherconfigured to store the predetermined control operation.