ELECTRONIC APPARATUS AND METHOD OF SELECTIVELY APPLYING SECURITY MODE IN MOBILE DEVICE

Information

  • Patent Application
  • 20250193304
  • Publication Number
    20250193304
  • Date Filed
    February 17, 2025
    3 months ago
  • Date Published
    June 12, 2025
    2 days ago
Abstract
A method of a mobile device includes controlling a panel of the mobile device to display an entire area screen, controlling the panel to display a smaller area screen smaller than the entire area screen, the smaller area screen including an unlock setting menu for selection of at least two unlock processes of a security mode which include performing a determination of whether a user of the mobile device is an authorized user stored in a memory of the mobile device, performing one of the at least two unlock processes in a power saving mode, and unlocking the mobile device to the normal mode from the power saving mode according to the determination.
Description
BACKGROUND OF THE INVENTIVE CONCEPT
1. Field of the Inventive Concept

The present inventive concept relates to an electronic apparatus and method of selectively applying a security mode in a mobile device.


2. Description of the Related Art

A conventional electronic mobile device, for example, a cellular phone, is set to a security mode or a non-security mode. When the set security mode is set, a user has to input a security code by enter a password, an image, or a geniture though a user interface unit. That is, a user has to input the security code every time to access the mobile device set with the security mode.


Even if a user is in a security safe zone, the user has to enter the security code previously set in the security mode. In order for the user to avoid inconvenience in the security safe zone, a user has to disable the security mode to avoid any inconvenience to enter the security code, and then later enable the security mode.


Moreover, since the mobile device is accessed only with the security code set in the security mode, no one is allowed to access the mobile device without the set security code. That is, a person having a high priority or authorization to access the mobile device cannot access the mobile device of a person having a lower priority or authorization.


SUMMARY OF THE INVENTIVE CONCEPT

The present inventive concept provides an electronic apparatus to selectively apply a security mode in a mobile device.


The present inventive concept provides a method of selectively applying a security mode in a mobile device.


The present inventive concept provides a computer readable medium to contain computer readable codes as a program to execute a method of selectively applying a security mode in a mobile device.


Additional features and utilities of the present inventive concept will be set forth in part in the description, which follows and, in part, will be obvious from the description, or may be learned by practice of the present inventive concept.


The foregoing and/or other features and utilities of the present inventive concept may be achieved by providing a method performed by a mobile device for allowing a user to access a normal mode in a non-security mode of the mobile device having a photographing unit and a network interface to wirelessly communicate with an external device, the method including controlling a panel of the mobile device to display an entire area screen, controlling the panel to display a smaller area screen smaller than the entire area screen, the smaller area screen including an unlock setting menu for selection of at least two unlock processes of a security mode which include performing a determination of whether a user of the mobile device is an authorized user stored in a memory of the mobile device, performing one of the at least two unlock processes in a power saving mode, and unlocking the mobile device to the normal mode from the power saving mode according to the determination.


The method may further include detecting a motion of the mobile device by using a sensor of the mobile device, and performing the one of the at least two unlock processes in response to the detected motion to unlock the mobile device to the normal mode from the power saving mode according to the determination.


The method may further include detecting a motion of the mobile device by using a sensor of the mobile device, performing the one of the at least two unlock processes in response to the detected motion, and performing the other one of the at least two unlock processes when the one of the at least two unlock processes fails, and unlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.


The method may further include setting a time period with the at least two unlock processes, and performing the one of the at least two unlock processes according to the time period in the power saving mode, and unlocking the mobile device to the normal mode from the power saving mode according to the determination.


The method may further include performing a second determination of whether the mobile device is in a time period, performing the one of the at least two unlock processes according to the second determination in the power saving mode, and unlocking the mobile device to the normal mode from the power saving mode according to the determination.


The method may further include setting a time period with the at least two unlock processes, performing the one of the at least two unlock processes when the mobile device is in the time period, and unlocking the mobile device to the normal mode from the power saving mode according to the determination of the one of the at least two unlock processes, and performing the other one of the at least two unlock processes when the mobile device is not in the time period, and unlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.


The method may further include setting a time period with the at least two unlock processes, performing the one of the at least two unlock processes when the mobile device is in the time period, and performing the other one of the at least two unlock processes when the one of the at least two unlock processes fails, and unlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.


The method may further include performing a second determination of whether the mobile device is in a time period, detecting a motion of the mobile device by using a sensor of the mobile device, and performing the one of the at least two unlock processes in response to the detected motion according to the second determination, and unlocking the mobile device to the normal mode from the power saving mode according to the determination.


The method may further include performing a second determination of whether the mobile device is in a time period, detecting a motion of the mobile device by using a sensor of the mobile device, performing the one of the at least two unlock processes in response to the detected motion and to the second determination, and performing the other one of the at least two unlock processes when the one of the at least two unlock processes fails, and unlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.


The user of the mobile device may include a safe zone recognition and a password input, the at least two unlock processes may include a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user, and the method may further include performing the first unlock process when the mobile device is in a time period, and unlocking the mobile device to the normal mode from the power saving mode according to the first determination.


The user of the mobile device may include a safe zone recognition and a password input, the at least two unlock processes may include a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user, and the method may further include performing the second unlock process when the mobile device is not in a time period, and unlocking the mobile device to the normal mode from the power saving mode according to the second determination.


The user of the mobile device may include a safe zone recognition and a password input, the at least two unlock processes may include a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user, and the method may further include performing the first unlock process when the mobile device is in a time period, and performing the second unlock process when the first unlock process fails, and unlocking the mobile device to the normal mode from the power saving mode according to the second determination.


The user of the mobile device may include a safe zone recognition and a password input, the at least two unlock processes may include a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user, and the method may further include detecting a motion of the mobile device by using a sensor of the mobile device, performing the first unlock process in response to the detected motion when the mobile device is in a time period, and unlocking the mobile device to the normal mode from the power saving mode according to the first determination.


The user of the mobile device may include a non-touch input and a touch input through the panel, the at least two unlock processes may include a first unlock process of performing a first determination of whether the non-touch input is the authorized user and a second unlock process of performing a second determination of whether the touch input is the authorized user, and the method may further include detecting a motion of the mobile device by using a sensor of the mobile device, performing the first unlock process in response to the detected motion when the mobile device is in a time period, and unlocking the mobile device to the normal mode from the power saving mode according to the first determination.


The user of the mobile device may include a wireless communication with the external device and a touch input through the panel, the at least two unlock processes may further include a first unlock process including a first determination of whether the wireless communication is the authorized user and a second unlock process including a second determination of whether the touch input is the authorized user, and the method may further include detecting a motion of the mobile device by using a sensor of the mobile device, performing the first unlock process in response to the detected motion when the mobile device is in a time period and performing the second unlock process in response to the detected motion when the mobile device is not in the time period, and unlocking the mobile device to the normal mode from the power saving mode according to one of the first determination and the second determination.


The user of the mobile device may include a first communication with a first external device and a second unlock process of a second communication with a second external device, the at least two unlock processes further include a first unlock process to perform a first determination of whether the first communication is the authorized user and a second unlock process to perform a second determination of whether the second communication is the authorized user, and the method may further include detecting a motion of the mobile device by using a sensor of the mobile device, performing the first unlock process in response to the detected motion when the mobile device is in a time period, and performing the second unlock process in response to the detected motion when the mobile device is not in the time period, and unlocking the mobile device to the normal mode from the power saving mode according to one of the first determination and the second determination.


The user of the mobile device may include a first safe zone recognition and a second safe zone, the at least two unlock processes may further include a first unlock process to perform a first determination of whether the first safe zone recognition is the authorized user and a second unlock process to perform a second determination of whether the second safe zone recognition is the authorized user, and the method may further include detecting a motion of the mobile device by using a sensor of the mobile device, performing the first unlock process in response to the detected motion, and performing the second unlock process when the first unlock process fails, and unlocking the mobile device to the normal mode from the power saving mode according to one of the first determination and the second determination.


The smaller area screen may further include a user finger reachable area such that a user finger of a user hand holding the mobile device is able to select the unlock setting menu displayed in the smaller area screen, and the entire area screen may include the user finger reachable area and a user finger unreachable area which are defined by a line on the panel.


The foregoing and/or other features and utilities of the present inventive concept may also be achieved by providing a computer-readable medium including computer-readable codes to execute the method describe above and hereinafter.


The foregoing and/or other features and utilities of the present inventive concept may also be achieved by providing a method performed by a mobile device for allowing a user to access a normal mode in a non-security mode of the mobile device having a photographing unit to photograph an object and a network interface to wirelessly communicate with an external device, the method including controlling a panel of the mobile device to display an entire area screen, controlling the panel to display a smaller area screen smaller than the entire area screen, the smaller area screen including an unlock setting menu for selection of at least two unlock processes of a security mode, setting a time condition to correspond to the at least two unlock processes, detecting a motion of the mobile device, and performing one of the at least two unlock processes according to the detected motion and the time condition to unlock the mobile device to the normal mode from a power saving mode.





BRIEF DESCRIPTION OF THE DRAWINGS

These and/or other features and utilities of the present general inventive concept will become apparent and more readily appreciated from the following description of the exemplary embodiments, taken in conjunction with the accompanying drawings of which:



FIG. 1 is a block diagram illustrating an electronic terminal to communicate with external devices according to an embodiment of the present inventive concept;



FIG. 2 is a diagram illustrating an electronic terminal according to an embodiment of the present inventive concept;



FIGS. 3A-3D are views illustrating an electronic terminal with a display unit and a user interface unit according to an embodiment of the present inventive concept;



FIG. 4 is a flowchart illustrating a method of selectively applying a security process in a mobile device according to an embodiment of the present inventive concept;



FIG. 5 is a flowchart illustrating a method of selectively applying a security process in a mobile device according to an embodiment of the present inventive concept;



FIG. 6A is a flowchart illustrating a method of setting a condition for a safe zone in a password setting mode of a mobile device according to an embodiment of the present inventive concept;



FIG. 6B is a flowchart illustrating a method of setting a condition for a non-safe zone in a non-password mode of a mobile device according to an embodiment of the present inventive concept;



FIGS. 7A through 71 are views illustrating screens of a mobile device to set a condition in a mobile device according to an embodiment of the present inventive concept;



FIGS. 8A through 8F are views illustrating screens of a mobile device to perform operations in a safe zone and in a non-safe zone according to an embodiment of the present inventive concept; and



FIG. 9 is a view illustrating a mobile device to display a user input menu within a user finger-reaching area according to an embodiment of the present inventive concept.





DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

Reference will now be made in detail to exemplary embodiments of the present general inventive concept, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout. The exemplary embodiments are described below in order to explain the present general inventive concept while referring to the figures.



FIG. 1 illustrates an electronic terminal apparatus 110 to communicate with one or more external apparatuses according to an embodiment of the present inventive concept. The electronic terminal apparatus 110 may be a computer apparatus, a portable personal computer, a mobile electronic device, a mobile phone, a mobile tablet apparatus, a mobile tablet computing apparatus, an audio or video recording and/or reproducing apparatus, a photographing apparatus, a communication device, etc.


The external apparatus may be an access point (AP) 120 such as a wireless access point device to connect to a wired network using WiFi, WiFi direct, or related standards, a device 130 such as a Bluetooth device or radio frequency identification (RFID) device, etc, and a station 140 for wireless communication such as a carrier service station for 4G, LTE, etc. However, the present general inventive concept is not limited thereto. It is possible that the external apparatus may be another electronic apparatus. It is also possible that the external apparatus may be an apparatus to communicate with the terminal 110 to transmit and receive data therebetween, and such an apparatus may be a home appliance, such as a refrigerator or air conditioner.


The terminal 110 may be disposed within an area defined by a line 120A distanced from the AP 120 or an area defined by a line 130A distanced from the device 130. The terminal 110 may communicate with the AP 120 using the AP-related technology when being disposed within the area defined by the line 120A, and may also communicate with the device 130 using the device-related technology when being disposed within the area defined by the line 130A.


The terminal 110 may have menus and/or functions to correspond to data (signal) of the AP 120, the device 130, and the station 140. The terminal 110 may have menus and functions to correspond to data (signal) stored in a storage unit of the terminal 110.



FIG. 2 illustrates a block diagram of an electronic terminal according to an embodiment of the present inventive concept. The terminal may include a control unit 210, a network interface 220, a user interface 230, a display unit 240, an audio unit 250, one or more functional unit 260, a power supply unit 270 including a battery and a battery charging unit. The above components may be disposed in or on a housing of the terminal.


The control unit 210 may control operations of the terminal and may include a data storage unit, for example, a semiconductor memory unit. The control unit 210 may be connected to an external data storage unit disposed in the housing. The housing of the terminal may include a port such that another external data storage can be detachably attached to the port of the housing, and the port may be connected to the control unit 110 to transmit and receive data.


The network interface unit 220 may communicate with an external network apparatus, for example, the AP 120, the device 130, and the station 140 which are illustrated in FIG. 1.


The user interface unit 230 may receive a user input to control operations of the terminal. The user interface unit 230 may include a physical button or key board such as QWERTY keyboard. The user interface unit 230 may have a sensor to detect a user gesture as a user input. The user interface unit 230 may include a microphone to detect a user voice as a user input. The user interface unit 230 may be a sensor to detect an image as a user input. The display unit 240 may include a screen to display an image corresponding to operations of the terminal. The display unit 240 may include a panel or a touch screen to perform a function to display an image and also a function to receive a user input. The user interface unit 230 and the display unit 240 may be formed as a single integrated body. The audio unit 250 may be a speaker and/or a microphone.


The functional unit 260 may be a photographing unit to photograph an object and to generate a signal corresponding to the photographing object. The signal may be processed in the control unit 210, displayed in the display unit 240, and/or transmitted to the external apparatus through the network interface unit 220.


The power supply unit 270 may be connectable to an external power source using a wired and/or wireless method.


The control unit 210 is configured to selectively perform a security mode according to a condition set by a user when the terminal receives a user input corresponding to a power-on, an activation mode in response to a deactivation mode, a wake-up mode in response to a sleep mode, and/or a normal mode in response to a power-saving mode. The activation, wake-up, and normal mode may be usable as a common function of the terminal or may be usable differently, according to a design or user preference. The condition may be a safe zone condition in a security mode or may be a non-safe zone in a non-security mode, for example. After the condition is set in a normal mode of the terminal, the terminal is changed to the deactivation mode (the sleep mode or the power-saving mode) a predetermined time after the normal mode or a predetermined time after no user input. And then the terminal provides a process for the security mode or does not provide the process for the security mode according to the condition when being changed to the activation mode (wake-up mode or the normal mode) according to the user input.



FIGS. 3A-3D illustrating an electronic terminal 300 formed with a display unit and a user interface unit to display screens 300A-300D corresponding to operations of the electronic terminal 300 according to an embodiment of the present inventive concept.


As illustrated in FIG. 3A, the screen 300A of the terminal 300 A does not show an image according to a deactivation mode, a sleep mode, or a power saving mode. The terminal 300 may have a power switch 311 and a switch 312 as a user input. The power switch 311 may be usable to turn on and off the terminal, and the switch 312 may be usable to change a mode of the terminal 300, that is, to change from the deactivation mode, the sleep mode, or the power saving mode to an activation mode, a wake-up mode, or a normal mode. The switch 312 may be a sensor to detect a motion of the terminal 300 or to detect a motion (image) of a user as a user input.


When the switch 312 of FIG. 3A is selected, the screen 300B of FIG. 3B may be displayed on a display unit to unlock or select a security process to access the terminal 300 in a security mode. The screen 300b may include a state section 321 and a menu section 322. The state section 321 may include a communication state with the AP 120, the device 130, and/or the station 321 of FIG. 1, and may also include other states corresponding to operations or functions set in the terminal 300 or environment around the terminal 300. The other states may include a time display or a battery state display, a temperature state display, a weather state display, etc. When the terminal 300 is in a power-on state, the terminal monitors, detects, determines, and/or performs communications with external devices to correspond to the above-described states of the state section 321.


When a menu 322A to unlock the terminal 300 is selected from the screen 300b, the screen 300C is displayed to show a security check process, for example, a password input process, as illustrated in FIG. 3C. The screen 300C may include a state section 331 and a menu section 332 having a password indication section 332A and a password input section 332B. When a password input by the user through the password input section 332B is identical to a password previously stored therein, the terminal 300 displays the screen 300D to show a state section 341 and a menu section 342 with menus (or icons) 342A.


When a first predetermined condition is set in the terminal 300 as a safe zone in a security mode (password setting mode), the screen 300A is changed to the screen 300D without displaying the screens 300B and 300C when the first predetermined condition is met. When the first predetermined condition is not met, the terminal displays the screens 300B and 300C to require a security process to enter a password. When a second predetermined condition is set in the terminal 300 as a non-safe zone in a non-security mode (no password setting), the terminal displays the screens 300A, 300B, 300C, and 300D to normally access the terminal when the second predetermined condition is met. When the second predetermined condition is not met, the terminal 300 may not display the screens 300B and 300C.


The state section 341 of the screen 300D may include an image corresponding to the safe zone and/or the non-safe zone according to the security mode and/or non-security mode, respectively. The state section 341 may not be selectable by a user as a user input. The menu section 342 of the screen 300D may include one or more menus 342A selectable by a user as a user input to perform a function or operation of the terminal 300. The menu section 342 of the screen 300D may include a settings menu (icon) to set the security mode, the non-security mode, the safe zone, and/or the non-safe zone, etc.



FIG. 4 illustrates a method of selectively applying a security mode in a mobile device according to an embodiment of the present inventive concept.


A power-on or activation switch is on in operation 410, a control unit of the mobile device determines whether a predetermined condition is met in operation 420. When the predetermined condition is met, that is, the mobile device is in a safe zone, the mobile device operates a normal mode in operation 430 such that a user can access the mobile device. When the predetermined condition is not met in operation 420, that is, the mobile device is not in the safe zone, the mobile device requires a user to enter a password in operation 440 to authorize the user to access of the mobile device.



FIG. 5 illustrates a method of selectively applying a security mode in a mobile device according to an embodiment of the present inventive concept


A predetermined condition is set in the mobile device in operation 510. When an activation switch is selected in operations 520A or 520B, a security mode is not performed to enter a normal mode in operation 530 or the security mode is performed in operation 540 when the predetermined condition is not met in operation 510. That is, the mobile device selectively performs the security mode according to selection of an activation switch as a user input. The mobile device selectively requires a user to perform the security mode. For example, when the mobile device is in a safe zone according to the predetermined condition, the user is not required to process the security mode to enter a password. However, the mobile device is not in the safe zone according to the predetermined condition, the user is still required to process the security mode to enter a password. Here, the password may be a character, number, motion, audio, and/or image.



FIG. 6A illustrates a method of setting a condition for a safe zone in a password setting mode of a mobile device according to an embodiment of the present inventive concept


A user selects a settings menu in operation 610, and then selects a password setting menu in operation 620 to set the mobile device as a security (password setting) mode or a non-security (no-password setting) mode.


A predetermined condition for a safe zone is selected in operation 630, and then is set in operation 640.



FIG. 6B illustrates a method of setting a condition for a non-safe zone in a non-password mode of a mobile device according to an embodiment of the present inventive concept.


When a user selects a non-security (no-password setting) mode or does not set a security mode in the settings menu in operation 650, the settings menu may further include a menu to select a non-safe zone (or password-required zone) in operation 660. The predetermined condition can be set in operation 670 such that the mobile device monitors a current condition thereof to determine whether the current condition meets the predetermined condition. When the predetermined condition is met, the mobile device requires the user to enter a password to access the mobile device in the non-security mode of the mobile device. When the predetermined condition is not met, the mobile device does not require the user to enter the password in a similar manner to the non-security mode.



FIGS. 7A through 71 illustrate screens 700A through 7001 of a mobile device to set a condition for a safe zone of a security mode or a non-safe zone of a non-security mode according to an embodiment of the present inventive concept.


When a settings menu (button or icon) 710 is selected in the screen 700A of the mobile device as a user input in FIG. 7A, the screen 700B of FIG. 7B is displayed on a display unit and/or user input unit of the mobile device to show a selection of “security setting” 721 to set a security (password) as a security mode, a selection of “all” 722 to apply the security mode to all functions or operations of the mobile device, and a selection of a “safe zone” 723 to prevent the security mode in a predetermined condition. It is possible that the selection of “all” 722 and selection of “safe zone” 723 may be displayed in a separate screen from a screen of the security setting 721, that is, the selection of “all” 722 and selection of “safe zone” 723 may be displayed, performed, or selected independently after the security setting 721 is performed to set the security mode.


When a menu of the safe zone 723 is selected, the screen 700C is displayed to show an area menu 731 and/or a time menu 732 as the predetermined condition. It is possible that both the area menu 731 and the time menu 732 can be selected and set as the predetermined condition. It is also possible that only one of the area menu 731 and the time menu 732 can be selected and set as the predetermined condition.


When the time menu 732 is selected, a specific time or a time period is set as the safe zone, using a new screen. Setting a specific time or a time period is well known, detail descriptions thereof will be omitted. When the time menu is performed to set the predetermined condition of the safe zone, the mobile device releases the security mode at the specific time or during the time period such that the user can access the mobile device without the security process according to the set time menu.


When the area menu 731 is selected, one or more area settings are displayed on the screen 700D of FIG. 7D. The one or more area settings may include a WiFi selection menu 741, a Bluetooth selection menu 742, and a communication method selection menu 743.


When the WiFi menu 741 is selected, at least one WiFi network 751 can be input, detected and then displayed, or selected as a safe zone in the screen 700E of FIG. 7E. When a user with a mobile device stays in a house of the user, for example, and an AP is located as a home use inside the house of the user, the AP as a home use may be reliable network and environment to the user and thus the home AP can be set as a safe zone. In this case, the user does not have to enter a password every time to activate or access the mobile device within an accessible area of the AP and/or inside the house. However, when a user with a mobile device stays away from the AP, the mobile device requires the user to enter the password since the predetermined condition is not met or the mobile device cannot communicate with the AP or lost a signal from the AP.


When the Bluetooth (device) is selected, at least one device 761 can be input, detected and then displayed, or selected as a safe zone in the screen 700f of FIG. 7F. When a user with a mobile device is in a vehicle owned by the user, for example, the Bluetooth and/or the vehicle may be reliable network and environment to the user and thus the device can be set as a safe zone. In this case, the user does not have to enter a password every time to activate or access the mobile device within an access area of the device, that is, within an inside of the vehicle.


It is possible that when a user vehicle is set as the device or the AP for the safe zone and when a signal indicating an emergence, for example, traffic collision or accident to the vehicle, is generated from the vehicle and then transmitted to the mobile device through the Bluetooth or WiFi, the mobile device can recognize the received signal as a predetermined condition of a safe zone so that the user can access and/or use the mobile device without entering a password in the security mode of the mobile device. Here, the vehicle and the mobile device are configured to recognize the signal as a portion of the predetermined condition of a safe zone. In this case, a combination of the selected device and a specific or predetermined signal from the selected device can be set as the safe zone of the mobile device, and when the mobile device receives the signal from the device, so that the user can access or use the mobile device without performing a security check process in a security mode of the mobile device.


It is also possible that when a user medical device is set as the device or the AP for the safe zone and when a signal indicating an emergence for example, a life threatening situation or accident to the user, is generated from the medical device and then transmitted to the mobile device through the Bluetooth or WIFi, the mobile device can recognize the received signal as a predetermined condition of a safe zone so that the user can access and/or use the mobile device without entering a password in the security mode of the mobile device. Here, the medical device and the mobile device are configured to recognize the signal as a portion of the predetermined condition of safe zone. In this case, a combination of the selected device and a specific or predetermined signal from the selected device can be set as a predetermined condition of the safe zone of the mobile device, and when the mobile device receives the signal from the device, so that the user can access or use the mobile device without performing a security check process in a security mode of the mobile device.


When the communication method 743 is selected, one or more communication methods (CMs) 771 and 772 can be selected and set as a safe zone on the screen 700g of FIG. 7G. In this case, a carrier name 771 and/or telephone number 772 can be reliable to the user. That is, when the user communicates with the person of the telephone number 772 and the carrier name 771, the user does not have to enter a password to use the mobile device.


In the screen 700H of FIG. 7H, at least one or a combination of the Wifi, Bluetooth, and communication method can be selected and/or set in a menu 781 as safe zone.


When the security mode is not selected or set in the settings menu 710 of the screen 700a, a menu 791 of non-safe zone can be selected and set such that the mobile device is set to perform a security mode in a non-security mode of the mobile device. For example, an AP, a device, or a communication method is set as the non-safe zone using one or more non-safe zone selection processes similar to the safe zone selection processes of FIGS. 7D through 7H.



FIGS. 8A through 8F illustrate screens 800a through 800f of a mobile device to perform operations in a safe zone and in a non-safe zone according to an embodiment of the present inventive concept



FIG. 8A illustrates the screen 800A, a power on/off switch 811, and an activation switch 812. FIG. 8B illustrates the screen 800b including a state section 821 and a menu section 822. The state section 821 may be similar to the state section 321, 331, and 341 of FIGS. 3B, 3C and 3D. The state section 821 may include a state indicator 821A to indicate a predetermined state and/or a safe zone in a security mode. The states displayed on the state section 821 may not be selectable by a user as a user input. The menu section 822 may include one or more menus 822A and 822B which are displayable on a display unit and/or selectable by a user as a user input.


When a current condition matches the predetermined condition as the safe zone, the mobile device displays the screen 800B by skipping a security mode process. It is possible that the mobile device can display on the screen 800C with a state section 831 and a menu section 832 including a text message 832A and selection menus 832B relating to the displayed text 832A when the mobile device receives the test message 3832A. It is also possible that the mobile device can display on the screen 800D with a state section 841 and a menu section 842 including a telephone call message 842A including selection menus relating to the telephone call message 842A when the mobile device receives the telephone call such that the user can access and use the mobile device.


The screen 800E of FIG. 8E illustrates a state section 851 and a menu section 852 including at least one menu 853. The screen 800E may be displayed when a password is entered in a security (password-setting) mode, when a predetermined condition of a safe zone is met in the security mode, or when a password is entered in a non-security mode and in a non-safe zone. The menu 853 may be a settings menu to select, change, or modify settings of the mobile device. In this case, it is possible that the mobile device may require the user to enter a password to select, change, or modify settings when the screen 800E is displayed when a predetermined condition of a safe zone is met in the security mode and accordingly a security mode is not preformed.



FIG. 9 illustrates a mobile device 900 to display a state section 911 and a user menu section 912 according to an embodiment of the present general inventive concept. A user U holds the mobile device 900 using one hand. At least one of user fingers UF of the user one hand can be usable to select a menu to input a user input. The user menu section 912 may include a user menu area 912B and a non-user menu area 912C which are defined by a line 912A to be a user-finger reachable area and a user-finger unreachable area, respectively. One or more menus or images displayed within the user menu area can be selectable by a user using a finger without assistance of the other hand finger, and one or more menus or images displayed within the non-user menu area 912C may not be reachable selectable by the user using the same finger. It is possible that the non-user menu area 912C may not include a menu to be selectable by a user as a user input. Accordingly, a user can control the mobile device with one hand.


The present general inventive concept can also be embodied as computer-readable codes on a computer-readable medium. The computer-readable medium can include a computer-readable recording medium and a computer-readable transmission medium. The computer-readable recording medium is any data storage device that can store data as a program which can be thereafter read by a computer system. Examples of the computer-readable recording medium include a read-only memory (ROM), a random-access memory (RAM), a flash memory, a semiconductor chip package, CD-ROMs, magnetic tapes, floppy disks, and optical data storage devices. The computer-readable recording medium can also be distributed over network coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion. The computer-readable transmission medium can transmit carrier waves or signals (e.g., wired or wireless data transmission through the Internet). Also, functional programs, codes, and code segments to accomplish the present general inventive concept can be easily construed by programmers skilled in the art to which the present general inventive concept pertains.


As illustrated above, a mobile device can be set in a security mode and a safe zone may be set in the security mode so that the mobile device does not require a user to enter a password when a current condition matches a predetermined condition of the safe zone.


Although a few exemplary embodiments of the present general inventive concept have been shown and described, it will be appreciated by those skilled in the art that changes may be made in these exemplary embodiments without departing from the principles and spirit of the general inventive concept, the scope of which is defined in the appended claims and their equivalents.

Claims
  • 1. A method performed by a mobile device for allowing a user to access a normal mode in a non-security mode of the mobile device having a photographing unit and a network interface to wirelessly communicate with an external device, the method comprising: controlling a panel of the mobile device to display an entire area screen;controlling the panel to display a smaller area screen smaller than the entire area screen, the smaller area screen including an unlock setting menu for selection of at least two unlock processes of a security mode to perform a determination of whether a user of the mobile device is an authorized user stored in a memory of the mobile device;performing one of the at least two unlock processes in a power saving mode; andunlocking the mobile device to the normal mode from the power saving mode according to the determination.
  • 2. The method of claim 1, wherein the method further comprises: detecting a motion of the mobile device by using a sensor of the mobile device; andperforming the one of the at least two unlock processes in response to the detected motion to unlock the mobile device to the normal mode from the power saving mode according to the determination.
  • 3. The method of claim 1, wherein the method further comprises: detecting a motion of the mobile device by using a sensor of the mobile device;performing the one of the at least two unlock processes in response to the detected motion, and performing the other one of the at least two unlock processes when the one of the at least two unlock processes fails; andunlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.
  • 4. The method of claim 1, wherein the method further comprises: setting a time period with the at least two unlock processes; andperforming the one of the at least two unlock processes according to the time period in the power saving mode; andunlocking the mobile device to the normal mode from the power saving mode according to the determination.
  • 5. The method of claim 1, wherein the method further comprises: performing a second determination of whether the mobile device is in a time period;performing the one of the at least two unlock processes according to the second determination in the power saving mode; andunlocking the mobile device to the normal mode from the power saving mode according to the determination.
  • 6. The method of claim 1, wherein the method further comprises: setting a time period with the at least two unlock processes;performing the one of the at least two unlock processes when the mobile device is in the time period, and unlocking the mobile device to the normal mode from the power saving mode according to the determination of the one of the at least two unlock processes; andperforming the other one of the at least two unlock processes when the mobile device is not in the time period, and unlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.
  • 7. The method of claim 1, wherein the method further comprises: setting a time period with the at least two unlock processes;performing the one of the at least two unlock processes when the mobile device is in the time period, and performing the other one of the at least two unlock processes when the one of the at least two unlock processes fails; andunlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.
  • 8. The method of claim 1, wherein the method further comprises: performing a second determination of whether the mobile device is in a time period;detecting a motion of the mobile device by using a sensor of the mobile device; andperforming the one of the at least two unlock processes in response to the detected motion according to the second determination, and unlocking the mobile device to the normal mode from the power saving mode according to the determination.
  • 9. The method of claim 1, wherein the method further comprises: performing a second determination of whether the mobile device is in a time period;detecting a motion of the mobile device by using a sensor of the mobile device;performing the one of the at least two unlock processes in response to the detected motion and to the second determination, and performing the other one of the at least two unlock processes when the one of the at least two unlock processes fails; andunlocking the mobile device to the normal mode from the power saving mode according to the determination of the other one of the at least two unlock processes.
  • 10. The method of claim 1, wherein: the user of the mobile device comprises a safe zone recognition and a password input;the at least two unlock processes comprise a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user; andthe method further comprises;performing the first unlock process when the mobile device is in a time period; andunlocking the mobile device to the normal mode from the power saving mode according to the first determination.
  • 11. The method of claim 1, wherein: the user of the mobile device comprises a safe zone recognition and a password input;the at least two unlock processes comprise a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user; andthe method further comprises;performing the second unlock process when the mobile device is not in a time period; andunlocking the mobile device to the normal mode from the power saving mode according to the second determination.
  • 12. The method of claim 1, wherein: the user of the mobile device comprises a safe zone recognition and a password input;the at least two unlock processes comprise a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user; andthe method further comprises;performing the first unlock process when the mobile device is in a time period, and performing the second unlock process when the first unlock process fails; andunlocking the mobile device to the normal mode from the power saving mode according to the second determination.
  • 13. The method of claim 1, wherein: the user of the mobile device comprises a safe zone recognition and a password input;the at least two unlock processes comprise a first unlock process of performing a first determination of whether the safe zone recognition is the authorized user and a second unlock process of performing a second determination of whether the password input is the authorized user; andthe method further comprises;detecting a motion of the mobile device by using a sensor of the mobile device;performing the first unlock process in response to the detected motion when the mobile device is in a time period, andunlocking the mobile device to the normal mode from the power saving mode according to the first determination.
  • 14. The method of claim 1, wherein: the user of the mobile device comprises a non-touch input and a touch input through the panel;the at least two unlock processes comprise a first unlock process of performing a first determination of whether the non-touch input is the authorized user and a second unlock process of performing a second determination of whether the touch input is the authorized user; andthe method further comprises;detecting a motion of the mobile device by using a sensor of the mobile device;performing the first unlock process in response to the detected motion when the mobile device is in a time period, andunlocking the mobile device to the normal mode from the power saving mode according to the first determination.
  • 15. The method of claim 1, wherein: the user of the mobile device comprises a wireless communication with the external device and a touch input through the panel;the at least two unlock processes further include a first unlock process including a first determination of whether the wireless communication is the authorized user and a second unlock process including a second determination of whether the touch input is the authorized user; andthe method further comprises;detecting a motion of the mobile device by using a sensor of the mobile device;performing the first unlock process in response to the detected motion when the mobile device is in a time period and performing the second unlock process in response to the detected motion when the mobile device is not in the time period; andunlocking the mobile device to the normal mode from the power saving mode according to one of the first determination and the second determination.
  • 16. The method of claim 1, wherein: the user of the mobile device comprises a first communication with a first external device and a second unlock process of a second communication with a second external device;the at least two unlock processes further include a first unlock process to perform a first determination of whether the first communication is the authorized user and a second unlock process to perform a second determination of whether the second communication is the authorized user; andthe method further comprises;detecting a motion of the mobile device by using a sensor of the mobile device;performing the first unlock process in response to the detected motion when the mobile device is in a time period, and performing the second unlock process in response to the detected motion when the mobile device is not in the time period; andunlocking the mobile device to the normal mode from the power saving mode according to one of the first determination and the second determination.
  • 17. The method of claim 1, wherein: the user of the mobile device comprises a first safe zone recognition and a second safe zone;the at least two unlock processes further include a first unlock process to perform a first determination of whether the first safe zone recognition is the authorized user and a second unlock process to perform a second determination of whether the second safe zone recognition is the authorized user; andthe method further comprises;detecting a motion of the mobile device by using a sensor of the mobile device;performing the first unlock process in response to the detected motion, and performing the second unlock process when the first unlock process fails; andunlocking the mobile device to the normal mode from the power saving mode according to one of the first determination and the second determination.
  • 18. The method of claim 1, wherein the smaller area screen comprises a user finger reachable area such that a user finger of a user hand holding the mobile device is able to select the unlock setting menu displayed in the smaller area screen, and the entire area screen comprises the user finger reachable area and a user finger unreachable area which are defined by a line on the panel.
  • 19. A non-transitory computer-readable medium comprising computer-readable codes to execute the method of claim 1.
  • 20. A method performed by a mobile device for allowing a user to access a normal mode in a non-security mode of the mobile device having a photographing unit to photograph an object and a network interface to wirelessly communicate with an external device, the method comprising: controlling a panel of the mobile device to display an entire area screen;controlling the panel to display a smaller area screen smaller than the entire area screen, the smaller area screen including an unlock setting menu for selection of at least two unlock processes of a security mode;setting a time condition to correspond to the at least two unlock processes;detecting a motion of the mobile device; andperforming one of the at least two unlock processes according to the detected motion and the time condition to unlock the mobile device to the normal mode from a power saving mode.
CROSS-REFERENCE TO RELATED APPLICATIONS

This U.S. non-provisional patent application is a divisional application under 35 U.S.C. § 120 of a divisional application Ser. No. 18/226,356, filed Jul. 26, 2023, which is a divisional application Ser. No. 18/088,671, filed Dec. 26, 2022, Now U.S. Pat. No. 11,838,437, which is a divisional application Ser. No. 17/524,823, filed Nov. 12, 2021, Now U.S. Pat. No. 11,553,072, which is a divisional application Ser. No. 16/679,181, filed Nov. 9, 2019, Now U.S. Pat. No. 11,184,771, which is a divisional application Ser. No. 16/402,275 filed May 3, 2019, Now U.S. Pat. No. 10,511,975, which is a divisional application of a U.S. non-provisional application Ser. No. 16/166,078 filed Oct. 20, 2018, now U.S. Pat. No. 10,299,133, which is a divisional application of a U.S. non-provisional application Ser. No. 16/127,286 filed on Sep. 11, 2018, now U.S. Pat. No. 10,149,164, which is a continuation application of a U.S. non-provisional application Ser. No. 15/984,375 filed on May 20, 2018, now Patent 10,085, 151 which is a continuation application of a U.S. non-provisional application Ser. No.: 15/972,135 filed on May 5, 2018, now U.S. Pat. No. 10,111,098, which is a divisional application of a U.S. non-provision patent application No.: 15/853,870 filed on Dec. 25, 2017, now U.S. Pat. No. 9,973,929, which is a continuation application of U.S. non-provisional application Ser. No.: 15/297,069, filed on Oct. 18, 2016, now U.S. Pat. No. 10,064,056, which is a continuation-in-part application of U.S. non-provisional patent application Ser. No.: 14/181,728, filed on Feb. 17, 2014, now U.S. Pat. No. 9,509,822, in the U.S. Patent and Trademark Office, the entire contents of which are hereby incorporated by reference.

Divisions (5)
Number Date Country
Parent 18226356 Jul 2023 US
Child 19054961 US
Parent 18088671 Dec 2022 US
Child 18226356 US
Parent 17524823 Nov 2021 US
Child 18088671 US
Parent 16679181 Nov 2019 US
Child 17524823 US
Parent 16402275 May 2019 US
Child 16679181 US