This application claims priority under 35 U.S.C. §119(a) to Korean Application Serial No. 10-2012-0087365 filed in the Korean Intellectual Property Office on Aug. 9, 2012, the entire content of which is incorporated herein by reference.
1. Field of the Invention
The present invention generally relates to a method for user authentication and an electronic device thereof.
2. Description of the Related Art
An electronic device may store important data, such as a large amount of address book, business data, and a personal finance certificate information. Therefore, a user sets the electronic device to be locked for security by using a password, pattern matching, face recognition, fingerprint scan, or the like.
However, although the user has set the electronic device to be locked by using the above-described methods, if a stranger obtains information about the password or the like by accident, and user authentication has passed only one time, there is a problem in that the stranger can use the electronic device freely. In addition, when the stranger, who has been successfully authenticated, performs a factory reset in the electronic device, there is a problem in that lock settings are permanently deleted.
As a result, there is a need for a technique in which, even though the user does not request user authentication, the electronic device itself requests the user authentication from the user to improve security of the electronic device.
The present invention has been made to address at least the problems and disadvantages described above, and to provide at least the advantages described below. Accordingly, aspects of the present invention provide a device and method for requesting an automatically set user authentication to improve security when it is determined that an electronic device does not connect to at least one of a stored access point and a stored peripheral device within a predetermined time period.
Another aspect of the present invention provides a device and method for storing a stored list of access points along with the GPS values corresponding to the access points to eliminate risk caused by hacking.
Another aspect of the present invention provides a device and method for storing a list of stored access points and a list of stored devices in an area to which factory reset can not be applied to improve security.
According to an aspect of the present invention, a method for operating an electronic device for performing user authentication using access point and peripheral device includes determining whether the electronic device connects to at least one of a stored access point and a stored device within a predetermined time period; and requesting a predetermined user authentication when it is determined that the electronic device has not connected to the at least one of the stored access point and device within the predetermined time period.
According to another aspect of the present invention, a method for operating a server for performing user authentication using an access point and a peripheral device includes receiving an emergency message from an electronic device in which user authentication has failed; and receiving the emergency message and transmitting user information to at least one stored email address and telephone number.
According to another aspect of the present invention, an electronic device for performing user authentication using an access point and a peripheral device includes a processor unit for determining whether an electronic device connects to at least one of a stored access point and a stored device within a predetermined time period; and a touchscreen for requesting a predetermined user authentication when it is determined that the electronic device has not connected to the at least one of the stored access point and device within the predetermined time period.
According to another aspect of the present invention, a server for performing user authentication using an access point and a peripheral device includes: a communication module for receiving an emergency message from an electronic device in which user authentication has failed, and transmitting user information to at least one stored email address and telephone number; and a processor unit for controlling overall operation.
The above and other aspects, features and advantages of the present invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings in which:
Hereinafter, various embodiments of the present invention will be described with reference to the accompanying drawings. In the following description of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may obscure the subject matter of the present invention. Also, the terms used herein are defined according to the functions of the present invention. Thus, the terms may vary depending on users' or operators' intentions or practices. Therefore, the terms used herein must be understood based on the descriptions made herein.
In the above described example, it is assumed that the predetermined time period is 24 hours, and the predetermined number of times is 4 times. If the electronic device has connected to the “access point 1,” the “access point 2,” and the “access point 3” at least 4 times within 24 hours, the electronic device automatically stores the “access point 1,” the “access point 2,” and the “access point 3” in an access point list. That is, the electronic device automatically stores an access point, to which the electronic device has connected at least a predetermined number of times within a predetermined time period, in the access point list.
Thereafter, the electronic device determines whether it connects to at least one automatically stored access point within the predetermined time period. This process is performed to request user authentication set by the electronic device itself. To avoid problems associated with conventional device locking methods, the electronic device according to the present invention itself requests user authentication from a user at a predetermined time period although the user does not manually request the user authentication, thereby improving the security of the electronic device.
Therefore, the electronic device determines whether it connects at least one stored access point within the predetermined time period, and autonomously requests a predetermined user authentication. That is, when it is determined that the electronic device does not connect to the at least one stored access point within the predetermined time period, the electronic device autonomously requests user authentication and receives the user authentication from a user. In the example above, if the predetermined time period is 48 hours, the electronic device determines whether it connects to any one of the “access point 1,” the “access point 2,” and the “access point 3” within 48 hours, and, if it is determined that there is no connection, the electronic device requests a predetermined user authentication. As a result, the electronic device actively requests user authentication for unlocking of the electronic device, without passively receiving unlock requirements from a user, thereby improving the security of the electronic device.
Accordingly, the electronic device automatically stores a list of at least one device to which the electronic device connects at least the predetermined number of times within the predetermined time period. For example, it is assumed that the user has a) listened to music stored in the electronic device by using a wireless headset (device 1), b) worked on a PC by transmitting a file stored in the electronic device to the PC (device 2), and c) listened to music stored in the electronic device by using the audio system of a vehicle (device 3). In addition, it is assumed that the predetermined time period is 72 hours, and the predetermined number of times is 2 times. In this example, if the electronic device has respectively connected to the “device 1,” the “device 2,” and the “device 3” at least 2 times within 72 hours, the electronic device automatically stores the “device 1,” the “device 2,” and the “device 3.” That is, the electronic device may automatically store a device to which it connects at least a predetermined number of times within a predetermined time period in a device list.
Subsequently, the electronic device determines whether it connects to at least one automatically stored device within the predetermined time period. This process is performed to request user authentication set by the electronic device itself. That is, the electronic device according to the present invention autonomously requests user authentication from a user at a predetermined time period even though the user does not manually request the user authentication, thereby improving the security of the electronic device.
Therefore, the electronic device determines whether it connects to at least one stored device within the predetermined time period, and autonomously requests a predetermined user authentication. That is, when it is determined that the electronic device has not connected to the at least one stored device within the predetermined time period, the electronic device autonomously requests user authentication and receives the user authentication from a user. For example, it is assumed that the “device 1,” the “device 2,” and the “device 3” are included in a device list automatically stored in the electronic device, and that a predetermined time period for request of user authentication is 24 hours. In this example, the electronic device determines whether it connects to at least one of the “device 1,” the “device 2,” and the “device 3” within 24 hours, and, if it is determined that there is no connection, requests a predetermined user authentication. As a result, the electronic device actively requests user authentication for unlocking of the electronic device, without passively receiving unlock requirements from a user, thereby improving the security of the electronic device.
The purpose of storing the GPS location values along with the access points is to request user authentication by the electronic device if the electronic does not determine that it is located within a predetermined distance from a connected access point although the electronic device connects to at least one stored access point within a predetermined time period. For example, when the electronic device is stolen and hacked by a stranger, the stranger may discover the stored access points, and freely use the electronic device. Accordingly, the electronic device stores the connected access points and their corresponding GPS location values, so that the electronic device can determine whether it is substantially located in the service area of the stored access point. That is, although the electronic device connects to the stored access point within the predetermined time period, whether the electronic device is located within the predetermined distance from the access point to which the electronic device connects is determined using the following Equation (1):
2r≧√{square root over ((x2−x1)2+(y2−y1)2)}{square root over ((x2−x1)2+(y2−y1)2)} (1)
where r denotes the communication radius of a connected access point, (x1, y1) denotes the stored GPS coordinates of the connected access point, and (x2, y2) denotes the currently measured GPS coordinates of the connected access point.
If Equation (1) is not satisfied, the electronic device is connected to a location that is outside of the communication coverage of the access point and not a stored GPS location corresponding to the stored access point. That is, if Equation (1) is not satisfied, the access point to which the electronic device connects is too far from the stored GPS location, which indicates a possibility that the electronic device connects to a different access point disguised as a stored access point. As a result, the electronic device requests user authentication, thereby addressing a possible risk.
In this example, the electronic device determines whether it has connected to the “access point 1” in a period of 24 hours and, if it has not, immediately requests user authentication. Similarly, the electronic device determines whether it has connected to the “access point 3” in a period of 168 hours and, if it has not, immediately requests user authentication. That is, there is an advantage in that a user can store different user authentication request time periods for different access points. For example, since at home or in an office where the user spends most of his/her time, the electronic device frequently connects to access points covering the corresponding area(s), it is preferred that the user sets a shorter user authentication request time period. Similarly, since, in an area where the user sometimes visits, the electronic device does not frequently connect to an access point covering the corresponding area, it is preferred that the user set a longer user authentication request time period.
In this example, the electronic device determines whether the electronic device has connected to the “device 1” during the time period of 24 hours, and immediately requests user authentication when the electronic device does not connect to the “device 1” within 24 hours. In addition, the electronic device determines whether the electronic device has connected to the “device 2” during the time period of 72 hours, and immediately requests user authentication when the electronic device does not connect to the “device 2” within 72 hours. Finally, the electronic device determines whether the electronic device has connected to the “device 3” during the time period of 168 hours, and immediately requests user authentication when the electronic device does not connect to the “device 3” within 168 hours. As a result, there is an advantage in that a user can store different user authentication request time periods for different access points. For example, a user may set a shorter user authentication request time period in the case of a PC to which the electronic device connects frequently, and a longer user authentication request time period in the case of a vehicle to which the electronic device does not connect frequently because the user usually uses public transportation.
In addition, even in a case where the user does not transfer ownership of the electronic device to a stranger, the stored access point list and the stored device list may still be deleted. For example, when the user moves to another office or moves out of the user's home, the access points covering areas including the original office or home do not need to be stored in the electronic device anymore. This is due to the fact that if the previous access points are not deleted and are still stored in the electronic device, the electronic device requests user authentication at the previously set predetermined time periods, which may be inconvenient to the user at the new office and/or home.
In this case, the initialization of a stored list may be defined as the initialization of at least one access point or device of a stored access point list or device list. Specifically, the initialization of a stored list may be defined as a deletion of at least one access point stored in the access point list and a new synchronization of stored access points, or as a deletion of at least one device stored in the device list and a new synchronization of stored devices. In other words, if the electronic device receives initialization of an initially stored list, the electronic device displays respective lists to be initialized such that the user selects at least one of initialization of stored access points and initialization of stored devices. In the present embodiment, the electronic device receives the initialization of devices contained in stored lists.
Although not illustrated in
In a first case, an electronic device determines that it has not connected to at least one of a stored access point and device, so that user authentication is requested. However, the user authentication fails. Specifically, when determining that the electronic device has not connected to at least one automatically stored access point and device within a predetermined time period, the electronic device requests user authentication in order to determine whether the user currently possessing the electronic device is the legal user. Thereafter, the electronic device receives user authentication from the user through a predetermined authentication method, such as a password, pattern matching, face recognition, fingerprint scan, or the like. If, upon reception of a result of the user authentication from the server, the electronic device determines that the user authentication has failed, the electronic device maintains a locked state, and requests a server to transmit an emergency message to a set email address and telephone number.
In a second case, the electronic device receives initialization of a stored list, so that the electronic device requests user authentication, but, as a result of the user authentication, the user authentication fails. Specifically, when receiving an input for initialization of at least one of a stored access point list and a stored device list, the electronic device requests user authentication from a server in order to determine whether the user currently possessing the electronic device is the legal user. Thereafter, the electronic device connects to the server, receives user authentication from the user, and receives a result of the user authentication from the server. For example, when the electronic device connects to the server, the server may request user authentication from the electronic device using an automatic response service or the like. That is, the electronic device receives a predetermined user authentication, such as the resident registration number of the user, from the user, transmits the same to the server, and receives a result of the user authentication from the server. If, upon reception of the result of the user authentication from the server, the electronic device determines that the user authentication has failed, the electronic device maintains a locked state, and requests the server to transmit an emergency message to a set email address and telephone number.
In order for the electronic device to request the server to transmit the emergency message to the set email address and telephone number, the electronic device needs to register the email address and telephone number with the server in advance. In this case, the email address and telephone number registered in the server may be the email address and telephone number of an acquaintance close to the user, such as a family member, friend or colleague of the user using the electronic device. Transmission of the emergency message by the server is a result of the fact that user authentication has failed in the electronic device, so that the user currently possessing the electronic device is not the legal user. The relationship among the electronic device of the user, the server and a registered electronic device is described below in further detail.
Similar to the above-described two cases, if an electronic device 501 determines that user authentication has failed, the electronic device 501 requests a server 502 to transmit an emergency message to a set email address and telephone number. Specifically, the electronic device 501 may make a request including at least one piece of current location information, the SSID and BSSID information of a connected access point, the ID information, and cell-related information of a connected base station, USIM information and user application log information, and transmit the same to the server 502.
In this case, the SSID of the access point is the name of the access point, and may be included in a beacon message which is periodically broadcast by a corresponding access point. In addition, the BSSID of the access point is the unique information of the access point, and may be included in all packets transmitted by the corresponding access point. In addition, the ID information of the base station is the unique identity information of the base station to which the electronic device connects, and may be included in a beacon message which is periodically broadcast by the corresponding base station. In addition, the cell-related information of the base station is the unique identity information of a cell managed by a base station to which the electronic device connects, and may be included in a beacon message which is periodically broadcast by the corresponding base station. In addition, the USIM information of the electronic device is unique information for identifying the user of an electronic device, and may be defined as a value stored in a USIM card mounted in the electronic device. In addition, the user application log information may be defined as a list of applications executed by a user.
The electronic device 501 sends a request, including the above-described information, to the server 502 to transmit the emergency message to the set email address and telephone number. Therefore, the server 502 may transmit the emergency message including the location information of the electronic device or the like to the set email address and telephone number. In
In step 602, the electronic device determines whether it connects to at least one of the stored access points. The purpose of this step is to request user authentication set by the electronic device itself. In contrast to the conventional electronic devices, the electronic device according to the present invention autonomously requests user authentication from a user at a predetermined time period even though the user does not manually request the user authentication, thereby improving the security of the electronic device.
If the electronic device determines that it has not connected to at least one of the stored access points within the predetermined time period, the electronic device determines whether it is located within a predetermined distance from the connected access point in step 603. The electronic device according to the present invention also stores the GPS location value of a corresponding access point when storing the access point list. In this case, the electronic device stores the GPS location values with respect to access points so that it requests user authentication when it cannot check that it is located within the predetermined distance from a connected access point, although the electronic device connects to at least one stored access point within a predetermined time period. Specifically, the reason for this is that, when the electronic device is stolen and hacked by a stranger, the stranger discovers stored access points, and freely uses the electronic device. Accordingly, the electronic device stores a connected access point and a corresponding GPS location value to determine whether the electronic device is substantially located within the service area of the stored access point. That is, although the electronic device connects to the stored access point within the predetermined time period, whether the electronic device is located within a predetermined distance from the access point to which the electronic device connects is checked using the Equation (1) above.
If the electronic device determines in step 602 that it has not connected to at least one of the stored access points within a predetermined time period, the electronic device determines whether the requested user authentication has passed in step 604. In this case, the user authentication may be defined as an arbitrary authentication method for unlocking a locked state set for the security of the electronic device. For example, the predetermined authentication method may include a password to be input to the electronic device, pattern matching, face recognition, fingerprint scan, or the like. That is, the user, from which the predetermined user authentication is requested by the electronic device, can continuously use the electronic device only when the user unlocks the electronic device. For example, if the electronic device is set to be locked using a password, the user must input a predetermined password to the electronic device to unlock the electronic device in order to use the electronic device continuously. Therefore, according to the present invention, the electronic device undergoes double user authentication, thereby improving the security of the electronic device.
If the electronic device has determined that the requested user authentication has passed, the electronic device repeatedly performs the above-described determination step 603. On the other hand, if the electronic device has determined that the requested user authentication has failed, the electronic device sets a locked state, and requests the server to transmit an emergency message to at least one stored email address and telephone number in step 605. Specifically, when determining that the electronic device has not connected to at least one automatically stored access point within the predetermined time period, the electronic device requests user authentication in order to determine whether the user currently possessing the electronic device is the legal user. Thereafter, the electronic device receives user authentication from the user using a predetermined authentication method, such as a password, pattern matching, face recognition, fingerprint scan, or the like. If, upon reception of a result of the user authentication from the server, the electronic device determines that the user authentication has failed, the electronic device maintains a locked state, requests the server to transmit an emergency message to a set email address and telephone number, and finally ends the operation flow of the electronic device.
If the electronic device determines that it is located within the predetermined distance from the connected access point in the above-described determination step 603, the electronic device ends the operation flow without requesting user authentication. However, if the electronic device determines that it is not located within the predetermined distance from the connected access point, the electronic device determines whether the requested user authentication has passed in step 606. This determination step is identical to the above-described determination step 604.
If the electronic device has determined that the requested user authentication has passed, it ends the operation flow. On the other hand, if the electronic device has determined that the requested user authentication has failed, the electronic device sets a locked state, and requests the server to transmit an emergency message to at least one stored email address and telephone number in step 607. This step is identical to the above-described step 605.
Thereafter, the electronic device determines whether it connects to at least one of the stored devices within the predetermined time period step 702. The purpose of this step is to request user authentication set by the electronic device itself. That is, the electronic device according to the present invention autonomously requests user authentication from the user at a predetermined time period even though the user does not manually request the user authentication, thereby improving the security of the electronic device.
If the electronic device determines that it has connected to at least one of the stored devices within the predetermined time period, the electronic device ends the operation flow. On the other hand, if the electronic device determines that it has not connected to at least one of the stored devices within the predetermined time period, the electronic device determines whether the requested user authentication has passed in step 703. In this case, the user authentication may be defined as an arbitrary authentication method for unlocking a locked state set for the security of the electronic device. For example, the predetermined authentication method may include a password to be input to the electronic device, pattern matching, face recognition, fingerprint scan, or the like. That is, the user, from which the predetermined user authentication is requested by the electronic device, can continuously use the electronic device only when the user unlocks the electronic device by using the predetermined authentication method. For example, if the electronic device is set to be locked using a password, the user must input a predetermined password to the electronic device to unlock the electronic device in order to use the electronic device continuously. Therefore, according to the present invention, the electronic device undergoes double user authentication, thereby improving the security of the electronic device.
If the electronic device has determined that the requested user authentication has passed, the operation flow of the electronic device is ended. On the other hand, if the electronic device has determined that the requested user authentication has failed, the electronic device sets a locked state, and requests the server to transmit an emergency message to at least one stored email address and telephone number in step 704. Specifically, when determining that the electronic device has not connected to at least one automatically stored device within the predetermined time period, the electronic device requests user authentication in order to determine whether the user currently possessing the electronic device is the legal user. Thereafter, the electronic device receives user authentication from the user through a predetermined authentication method, such as a password, pattern matching, face recognition, fingerprint scan, or the like. If, upon reception of a result of the user authentication from the server, the electronic device determines that the user authentication has failed, the electronic device maintains a locked state, requests the server to transmit an emergency message to a set email address and telephone number, and finally ends the operation flow of the electronic device.
The server, which has received and stored at least one email address and telephone number for transmission of the emergency message, receives an emergency message from an electronic device in which the user authentication has failed in step 802. Specifically, the server may receive the emergency message including at least one piece of the current location information of the electronic device, the SSID and BSSID information of a connected access point, the ID and cell-related information of a connected base station, USIM information, and user application log information, from the electronic device.
Thereafter, the server receives the emergency message from the electronic device and transmits user information to the at least one stored email address and telephone number in step 803. That is, the server may transmit the emergency message including the location information of the electronic device or the like to the stored email address and telephone number. Therefore, the respective users of the predetermined electronic devices which receive the emergency message from the server can take an action suitable for a situation.
The electronic device 900 includes a memory 910, a processor unit 920, a first wireless communication subsystem 930, a second wireless communication subsystem 931, an external port 960, an audio subsystem 950, a speaker 951, a microphone 952, an input/output (I/O) system 970, a touchscreen 980, and other input/control devices 990. The electronic device 900 may include one or more of the memory 910 and the external port 960.
The processor unit 920 may include a memory interface 921, at least one processor 922, and a peripheral interface 923. In some cases, the processor unit 920 will also be referred to as a processor. According to the present invention, the processor unit 920 determines whether the electronic device has connected to at least one of the stored access point and device within a predetermined time period. The purpose of this determination is to request user authentication set by the electronic device itself. In contrast to the conventional electronic device described above, the electronic device 900 (via the processor unit 920) according to the present invention autonomously requests user authentication from the user at a predetermined time period even though the user does not manually request the user authentication, thereby improving improved security of the electronic device.
In addition, the processor unit 920 checks that the electronic device has connected to at least one stored access point within a predetermined time period and determines whether the electronic device is located within a predetermined distance from the connected access point. In addition, the processor unit 920 may check whether the electronic device is located within the predetermined distance from the connected access point, receive a predetermined user authentication to determine whether the user authentication has passed, and, when it is determined that the user authentication has failed, sets a locked state. In this case, the user authentication may be defined as an arbitrary authentication method for unlocking a lock state set for the security of the electronic device. For example, the predetermined authentication method may include a password to be input to the electronic device, pattern matching, face recognition, fingerprint scan, or the like. That is, the user, from which the predetermined user authentication is requested by the electronic device, can continuously use the electronic device only when the user unlocks the electronic device by using the predetermined authentication method. For example, if the electronic device is set to be locked using a password, the user must input a predetermined password to the electronic device to unlock the electronic device in order to use the electronic device continuously. Therefore, according to the present invention, the electronic device undergoes double user authentication, thereby improving the security of the electronic device.
In addition, the processor unit 920 determines whether user authentication has passed, and, when the user authentication has passed, initializes at least one of the stored access point list and device list. Specifically, when the user wants to transfer ownership of the electronic device to a stranger, the user may input the initialization of a stored list so as to prohibit a stored access point list and a stored device list from being disclosed to the stranger. For example, when the user wants to sell the electronic device, which has been used by the user, to a stranger, access points to which the user has frequently connected are stored in the electronic device, which may cause the invasion of the user's privacy. Therefore, the user deletes the access point list and the device list which are stored in the electronic device before transferring ownership of the electronic device to a stranger, so that it is possible to prevent the user's privacy from being invaded.
The processor 922 executes various software programs to perform various functions for the electronic device 900, and performs processes and controls for voice communication and data communication. In addition to these general functions, the processor 922 executes a specific software module (instruction set) stored in the memory 910 and performs various specific functions corresponding to the software module. That is, the processor 922 performs methods of the embodiments of the present invention in cooperation with software modules stored in the memory 910.
The processor 922 may include at least one data processor, image processor, or codec. The data processor, the image processor, or the codec may be configured separately. Also, the processor 922 may be configured by a plurality of processors performing different functions. The peripheral interface 923 connects various peripheral devices and the I/O system 970 of the electronic device 900 to the processor 922 and the memory 910 (through the memory interface 921).
The various elements of the electronic device 900 may be coupled by at least one communication bus (not illustrated) or stream line (not illustrated).
The external port 960 is used for connection to other electronic devices directly or indirectly through a network (for example, Internet, intranet, or wireless LAN). The external port 960 may be, for example, a universal serial bus (USB) port or a FireWire port, but is not limited thereto.
A motion sensor 991 and a first optical sensor 992 may be connected to the peripheral interface 923 to facilitate various functions. For example, the motion sensor 991 and the optical sensor 992 may be connected to the peripheral interface 923 to detect a motion of the electronic device 900 and detect light from the outside. In addition, other sensors such as a positioning system, a temperature sensor, and a biosensor (not shown) may be connected to the peripheral interface 923 to perform relevant functions.
A camera subsystem 993 may perform camera functions such as photographing and video clip recording.
The optical sensor 992 may include a CCD (charged coupled device) or a CMOS (complementary metal-oxide semiconductor) device.
A communication function is performed through one or more wireless communication subsystems 930 and 931. The communication systems 930 and 931 may include a radio frequency (RF) receiver and transceiver and/or an optical (e.g., infrared) receiver and transceiver. The first wireless communication subsystem 930 and the second wireless communication subsystem 931 may be divided according to communication networks through which the electronic device 900 communicates. For example, the communication networks may include, but are not limited to, communication subsystems operated through a GSM (Global System for Mobile Communication) network, an EDGE (Enhanced Data GSM Environment) network, a CDMA (Code Division Multiple Access) network, a W-CDMA (W-Code Division Multiple Access) network, an LTE (Long Term Evolution) network, an OFDMA (Orthogonal Frequency Division Multiple Access) network, a WiFi (Wireless Fidelity) network, a WiMax network, and/or a Bluetooth network.
The audio subsystem 950 is connected to the speaker 951 and the microphone 952 to perform audio stream input/output functions such as voice recognition, voice replication, digital recording, and phone functions. That is, the audio subsystem 950 communicates with the user through the speaker 951 and the microphone 952. The audio subsystem 950 receives a data stream through the peripheral interface 923 of the processor unit 920 and converts the received data stream into an electric stream. The electric stream is transmitted to the speaker 951. The speaker 951 converts the electric stream into sound waves audible by humans and outputs the same. The microphone 952 converts sound waves received from humans or other sound sources into an electric stream. The audio subsystem 950 receives an electric stream converted from the microphone 952. The audio subsystem 950 converts the received electric stream into an audio data stream and transmits the audio data stream to the peripheral interface 923. The audio subsystem 950 may include, for example, an attachable/detachable earphone, a headphone, or a headset.
The I/O subsystem 970 may include a touchscreen controller 971 and/or an other input controller 972. The touchscreen controller 971 may be connected to the touchscreen 980. The touchscreen 980 and the touchscreen controller 971 may detect a touch, a motion, or a stop thereof by using multi-touch detection technologies including a proximity sensor array or other elements, as well as capacitive, resistive, infrared and surface acoustic wave technologies for determining one or more touch points with the touchscreen 980. The other input controller 972 may be connected to the other input/control devices 990. The other input/control devices 990 may include one or more buttons, a rocker switch, a thumb wheel, a dial, a stick, and/or a pointer device such as a stylus.
The touchscreen 980 provides an I/O interface between the electronic device 900 and the user. That is, the touchscreen 980 transmits a user touch input to the electronic device 900. Also, the touchscreen 980 is a medium that displays an output from the electronic device 900 to the user. That is, the touchscreen 980 displays a visual output to the user. The visual output may be represented by a text, a graphic, a video, or a combination thereof.
The touchscreen 980 may use various display technologies. For example, the touchscreen 980 may use an LCD (liquid crystal display), an LED (Light Emitting Diode), an LPD (light emitting polymer display), an OLED (Organic Light Emitting Diode), an AMOLED (Active Matrix Organic Light Emitting Diode), or an FLED (Flexible LED). In the present invention, when determining that the electronic device has connected to at least one of a stored access point and device within a predetermined time period, the touchscreen 980 requests a predetermined user authentication, receives initialization of the at least one list of the stored access point list and device list, and connects to a server to request the user authentication.
The memory 910 may be connected to the memory interface 921. The memory 910 may include one or more high-speed random-access memories (RAMs) such as magnetic disk storage devices, one more nonvolatile memories, one or more optical storage devices, and/or one or more flash memories (for example, NAND flash memories or NOR flash memories).
The memory 910 may also store software. Elements of the software include an operation system (OS) module 911, a communication module 912, a graphics module 913, a user interface (UI) module 914, a MPEG module 915, a camera module 916, and one or more application modules 917. Also, since the module that is an element of the software may be represented as a set of instructions, the module may be referred to as an instruction set. The module may also be referred to as a program. According to the present invention, the memory 910 automatically stores a list of at least one access point or a list of at least one device to which the electronic device has connected at least a predetermined number of times within the predetermined time period, and also the GPS location values of the access points along with the stored list of access points. In addition, the memory 910 stores the list of access points and the list of devices in an area to which factory reset cannot be applied, and stores the GPS location values of the access points in an area to which factory reset cannot be applied.
The OS module 911 (for example, WINDOWS, LINUX, Darwin, RTXC, UNIX, OS X, or an embedded OS such as VxWorks) includes various software elements for controlling general system operations. For example, general system operation controls include memory control/management, storage hardware (device) control/management, and power control/management. The OS module also performs a function for enabling smooth communication between various hardware elements (devices) and software elements (modules).
The communication module 912 may enable communication with other electronic devices (such as computers, servers, and/or portable terminals) through the wireless communication subsystems 930 and 931 or the external port 960. In the present invention, the communication module 912 requests a server to transmit an emergency message to at least one stored email address and telephone number, and includes at least one of the current location information of the electronic device, the SSID and BSSID information of a connected access point, the ID and cell-related information of a connected base station, USIM information and user application log information, in a request. In addition, the communication module 912 receives a result of the user authentication from the server, and requests the server to transmit the emergency message to the at least one stored email address and telephone number.
The graphics module 913 includes various software elements for providing and displaying graphics on the touchscreen 980. The graphics may include, for example, texts, web pages, icons, digital images, videos, and animations. In the present invention, the touchscreen 980 displays a message about whether a smart rotation function is set, and receives a selection of a region included in the message.
The UI module 914 includes various software elements related to a user interface. Through the user interface module, the electronic device 900 provides information about how the state of a user interface changes and/or information about under what condition the state of a user interface changes.
The codec module 915 may include software elements related to video file encoding/decoding. The codec module 915 may include a video stream module such as an MPEG module or an H204 module. Also, the codec module 915 may include various audio file codec modules such as AAA, AMR, and WMA. Also, the codec module 915 includes an instruction set corresponding to the implementation methods of the present invention.
The camera module 916 may include camera-related software elements that enable camera-related processes and functions.
The application module 917 includes, for example, a browser application, an e-mail application, an instant message application, a word processing application, a keyboard emulation application, an address book application, a touch list application, a widget application, a digital right management (DRM) application, a voice recognition application, a voice replication application, a position determining function application, a location-based service (LBS) application, and the like.
In addition, various functions of the electronic device 900 according to the present invention, which have been described above and will be described below, may be implemented by any combination of hardware and/or software including one or more stream processings and/or an application-specific integrated circuit (ASIC).
The control unit 1001 controls an overall operation of the server. Specifically, the control unit 1001 is connected to the communication module 1002 and the memory 1003 to control the overall operation of the server.
The communication module 1022 receives the emergency message from the electronic device 900 in which user authentication has failed, and transmits user information to the at least one stored email address and telephone number. That is, the server may transmit the emergency message including the location information of the electronic device, or the like to the set email address and telephone number. Therefore, the respective users of the predetermined electronic devices which receive the emergency message from the server can take an action suitable for a situation. In addition, the communication module 1002 receives a request for user authentication from the electronic device 900, attempts to obtain the user authentication with the electronic device 900, and transmits a result of the user authentication to the electronic device 900.
The memory 1003 receives and stores at least one email address and telephone number to which an emergency message will be transmitted, from the electronic device 900.
The above configurations should be considered in descriptive sense only and not for the purpose of limitation. Those skilled in the art will understand that various changes may be made therein without departing from the scope of the present invention. For example, although the communication module 1002 and the memory 1003 are provided and illustrated separately, the control unit 1001 may be configured to perform all or some of the functions of the communication module 1002 and the memory 1003.
According to an electronic device and method for performing user authentication using access points and peripheral devices, when an electronic device does not connect to a stored access point or peripheral device within a predetermined time period, a predetermined user authentication is automatically requested, thereby improving security.
While the invention has been shown and described with reference to certain embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the scope of the invention is defined not by the detailed description of the invention but by the appended claims, and all differences within the scope will be construed as being included in the present invention.
Number | Date | Country | Kind |
---|---|---|---|
10-2012-0087365 | Aug 2012 | KR | national |