KR20170001468A - Mobile terminal and method for controlling the same - Google Patents
Mobile terminal and method for controlling the same Download PDFInfo
- Publication number
- KR20170001468A KR20170001468A KR1020150091490A KR20150091490A KR20170001468A KR 20170001468 A KR20170001468 A KR 20170001468A KR 1020150091490 A KR1020150091490 A KR 1020150091490A KR 20150091490 A KR20150091490 A KR 20150091490A KR 20170001468 A KR20170001468 A KR 20170001468A
- Authority
- KR
- South Korea
- Prior art keywords
- input
- information
- fingerprint
- fingerprint information
- authentication
- Prior art date
Links
Images
Classifications
-
- H04M1/72519—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G06K9/00013—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6054—Biometric subscriber identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/22—Details of telephonic subscriber devices including a touch pad, a touch sensor or a touch detector
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
Description
The present invention relates to a mobile terminal capable of receiving authentication information for releasing a security state and a control method thereof.
A terminal can be divided into a mobile terminal (mobile / portable terminal) and a stationary terminal according to whether the terminal can be moved. The mobile terminal can be divided into a handheld terminal and a vehicle mounted terminal according to whether the user can directly carry the mobile terminal.
The functions of mobile terminals are diversified. For example, there are data and voice communication, photographing and video shooting through a camera, voice recording, music file playback through a speaker system, and outputting an image or video on a display unit. Some terminals are equipped with an electronic game play function or a multimedia player function. In particular, modern mobile terminals can receive multicast signals that provide visual content such as broadcast and video or television programs.
Such a terminal has various functions, for example, in the form of a multimedia device having multiple functions such as photographing and photographing of a moving picture, reproduction of a music or video file, reception of a game and broadcasting, etc. .
As a result, the user may perform a financial transaction through the terminal or input and store personal information requiring security. As a result, various authentication methods for securing the terminal are required. In order to support and enhance the functionality of such terminals, it may be considered to improve the structural and / or software parts of the terminal.
The present invention is directed to solving the above-mentioned problems and other problems. It is another object of the present invention to provide a mobile terminal and a control method thereof, which can enhance security by requesting input of authentication information in a manner different from an authentication information input method previously set for security release .
According to an aspect of the present invention, there is provided an authentication method for authenticating a user of a portable terminal, the method comprising: A display unit for outputting time information for requesting input of the authentication information; And a controller for maintaining the security state based on the input of the authentication information in the different input method and releasing the security state based on input of the authentication information in the previously set input method And a mobile terminal.
In one embodiment of the present invention, the display unit displays the first fingerprint information for releasing the security state and the first fingerprint information for the second fingerprint information at a second position different from the first position, Time information for requesting input of fingerprint information can be output.
In another embodiment, the control unit maintains the secure state based on the input of the first fingerprint information at the second position, and based on the input of the first fingerprint information at the first position, The secure state can be released.
In another embodiment, the control unit maintains the security state based on the input of the first fingerprint information at the second position, and at least one fingerprint information different from the first fingerprint information, The first fingerprint information is input in a predetermined order to the first fingerprint information.
In another embodiment, the display unit may output a guide line for the first position to be detected by the user.
In another embodiment, the control unit may be configured to determine whether the first fingerprint information for releasing the security state and the first fingerprint information at a time other than the time interval, The security state is maintained based on input of the first fingerprint information, and the security state can be released based on the input of the first fingerprint information within the time period.
In another embodiment, the display unit may output time information for detecting the time interval by the user.
In another embodiment, the control unit may release the security state based on the simultaneous input of the first fingerprint information for releasing the security state and the at least one fingerprint information different from the first fingerprint information have.
In another embodiment, the display unit may request input of authentication information different from fingerprint information in correspondence with the first fingerprint information for releasing the security state and the first position at which the first fingerprint information is input Time information can be output.
In another embodiment, the control unit maintains the security state based on input of authentication information different from the fingerprint information, and based on the input of the first fingerprint information at the first position, Can be released.
According to another aspect of the present invention, there is provided an authentication method for an authentication system, comprising the steps of: (a) in response to authentication information previously set for releasing a security state and a predetermined input method of the authentication information, Outputting time information for requesting input of information; And (b) maintaining the security state based on the input of the authentication information in the different input method, and releasing the security state based on input of the authentication information into the previously set input method; And a control method of the mobile terminal.
In the embodiment, the step (a) may include a step of, in response to the first fingerprint information for releasing the security state and the first position at which the first fingerprint information is input, And outputting time information for requesting input of the first fingerprint information.
In yet another embodiment, the step (b) may include: maintaining the secure state based on the input of the first fingerprint information at the second location, wherein the first fingerprint information is input to the first location And releasing the security state based on the security state.
In another embodiment, the step (b) may further include: maintaining the security state based on the input of the first fingerprint information at the second location, and storing at least one fingerprint information different from the first fingerprint information And releasing the security state based on that the first fingerprint information is input in the predetermined position in the first position.
In yet another embodiment, the step (a) may include outputting a guideline for the first position to be detected by the user.
In another embodiment, the step (b) may further include a step of, in correspondence with the first fingerprint information for releasing the security state and the time period in which the first fingerprint information is input, And maintaining the security state based on input of the first fingerprint information, and releasing the security state based on input of the first fingerprint information within the time period.
In another embodiment, the step (a) may include outputting time information for the user to detect the time interval.
In yet another embodiment, the step (b) may further include the step of, based on simultaneously inputting first fingerprint information for canceling the security state and at least one fingerprint information different from the first fingerprint information, The method comprising:
In yet another embodiment, the step (a) may include inputting first authentication information for canceling the security state and authentication information different from fingerprint information in correspondence with a first position at which the first fingerprint information is to be input And outputting the time information requesting the time information.
In another embodiment, the step (b) may further include: maintaining the security state based on input of authentication information different from the fingerprint information, and based on the input of the first fingerprint information at the first position And releasing the security state.
Effects of the mobile terminal and the control method according to the present invention will be described as follows.
According to at least one of the embodiments of the present invention, there is an advantage that security can be enhanced by requesting input of authentication information in a manner different from an authentication information input method previously set for security release.
Also, according to at least one of the embodiments of the present invention, there is an advantage that the efficiency of the authentication process can be enhanced by blocking illegal authentication step by step.
Further scope of applicability of the present invention will become apparent from the following detailed description. It should be understood, however, that the detailed description and specific examples, such as the preferred embodiments of the invention, are given by way of illustration only, since various changes and modifications within the spirit and scope of the invention will become apparent to those skilled in the art.
1A is a block diagram illustrating a mobile terminal according to the present invention.
1B and 1C are conceptual diagrams illustrating an example of a mobile terminal according to the present invention in different directions.
2 is a flowchart illustrating a method of controlling a mobile terminal according to the present invention.
3 is a conceptual diagram for explaining an embodiment in which authentication is completed when the fake input area is output.
4 is a conceptual diagram for explaining an embodiment in which authentication fails when outputting a fake input area.
5A to 5C are conceptual diagrams for explaining an embodiment in which a fake input window is output.
FIG. 6 is a conceptual diagram for explaining an embodiment for receiving a registration fingerprint in an authentication area.
7A to 7C are conceptual diagrams for explaining an embodiment in which an authentication fingerprint and an unauthenticated fingerprint are sequentially input.
FIG. 8 is a conceptual diagram for explaining an embodiment in which authentication is completed when the authentication method is set as described with reference to FIG. 7A.
FIG. 9 is a conceptual diagram for explaining an embodiment in which authentication fails when the authentication method is set as described in FIG. 7A.
FIG. 10 is a conceptual diagram for explaining an embodiment in which a fingerprint is inputted in a time interval other than a predetermined time period and authentication fails.
FIG. 11 is a conceptual diagram for explaining an embodiment in which a fingerprint is input in a predetermined time interval and authentication is completed.
12A to 12C are conceptual diagrams for explaining an embodiment in which a fingerprint input window including a plurality of fingerprint input areas is output.
13 is a conceptual diagram for explaining an embodiment in which a registration fingerprint and an unregistered fingerprint are input into a plurality of fingerprint input areas and authentication is completed.
14 is a conceptual diagram for explaining an embodiment in which authentication is completed by inputting a registration fingerprint on a password lock screen.
15 is a conceptual diagram for explaining an embodiment in which authentication is completed by inputting a registration fingerprint on a pattern lock screen.
16 is a conceptual diagram for explaining an embodiment in which authentication is completed when knock code is input and fake input area is output.
FIG. 17 is a conceptual diagram for explaining an embodiment in which authentication is completed when a knock code is input and a fingerprint input area is output. FIG.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings, wherein like reference numerals are used to designate identical or similar elements, and redundant description thereof will be omitted. The suffix "module" and " part "for the components used in the following description are given or mixed in consideration of ease of specification, and do not have their own meaning or role. In the following description of the embodiments of the present invention, a detailed description of related arts will be omitted when it is determined that the gist of the embodiments disclosed herein may be blurred. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are intended to provide further explanation of the invention as claimed. , ≪ / RTI > equivalents, and alternatives.
The mobile terminal described in this specification includes a mobile phone, a smart phone, a laptop computer, a digital broadcasting terminal, a personal digital assistant (PDA), a portable multimedia player (PMP), a navigation device, a slate PC A tablet PC, an ultrabook, a wearable device such as a smartwatch, a smart glass, and a head mounted display (HMD). have.
However, it will be appreciated by those skilled in the art that the configuration according to the embodiments described herein may be applied to fixed terminals such as a digital TV, a desktop computer, a digital signage, and the like, will be.
1A to 1C are block diagrams for explaining a mobile terminal according to the present invention, and FIGS. 1B and 1C are conceptual diagrams showing an example of a mobile terminal according to the present invention in different directions.
The
The
The
The
The
The
The
In addition, the
In addition to the operations related to the application program, the
In addition, the
The
At least some of the components may operate in cooperation with one another to implement a method of operation, control, or control of a mobile terminal according to various embodiments described below. In addition, the operation, control, or control method of the mobile terminal may be implemented on the mobile terminal by driving at least one application program stored in the
Hereinafter, the various components of the
First, referring to the
The
The wireless signal may include various types of data depending on a voice call signal, a video call signal or a text / multimedia message transmission / reception.
The
Wireless Internet technologies include, for example, wireless LAN (WLAN), wireless fidelity (Wi-Fi), wireless fidelity (Wi-Fi) Direct, DLNA (Digital Living Network Alliance), WiBro Interoperability for Microwave Access, High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) 113 transmit and receive data according to at least one wireless Internet technology, including Internet technologies not listed above.
The
The short-
Here, the other
The
Next, the
The
The
Meanwhile, the
First, the
Examples of the
On the other hand, for convenience of explanation, the act of recognizing that the object is located on the touch screen in proximity with no object touching the touch screen is referred to as "proximity touch & The act of actually touching an object on the screen is called a "contact touch. &Quot; The position at which the object is closely touched on the touch screen means a position where the object corresponds to the touch screen vertically when the object is touched. The
The touch sensor uses a touch (or touch input) applied to the touch screen (or the display unit 151) by using at least one of various touch methods such as a resistance film type, a capacitive type, an infrared type, an ultrasonic type, Detection.
For example, the touch sensor may be configured to convert a change in a pressure applied to a specific portion of the touch screen or a capacitance generated in a specific portion to an electrical input signal. The touch sensor may be configured to detect a position, an area, a pressure at the time of touch, a capacitance at the time of touch, and the like where a touch object touching the touch screen is touched on the touch sensor. Here, the touch object may be a finger, a touch pen, a stylus pen, a pointer, or the like as an object to which a touch is applied to the touch sensor.
Thus, when there is a touch input to the touch sensor, the corresponding signal (s) is sent to the touch controller. The touch controller processes the signal (s) and transmits the corresponding data to the
On the other hand, the
Meanwhile, the touch sensor may be configured to detect the touch input using different methods in the activated and deactivated states of the
For example, in a state in which the
The activation of the touch sensor can be distinguished by using the power consumption of the touch sensor. For example, if the power consumption of the touch sensor is less than a predetermined reference value based on 0, the touch sensor is in a deactivated state, and if the power consumption of the touch sensor is greater than the predetermined reference value , It can be said that it is activated.
When the
On the other hand, the shorter the specific period in which the touch sensor is activated, the faster the touch input sensing the touch of the
Therefore, the specific period can be set so as to increase the efficiency of power consumption while sensing the touch input that hits the
Meanwhile, during the activated state of the
On the other hand, in the doze mode in which the
In addition, the touch sensors can be driven at different periods based on the state of the
On the other hand, the touch sensors and the proximity sensors discussed above can be used independently or in combination to provide a short touch (touch), a long touch, a multi touch, a drag touch ), Flick touch, pinch-in touch, pinch-out touch, swipe touch, hovering touch, and the like. Touch can be sensed.
The ultrasonic sensor can recognize the position information of the object to be sensed by using ultrasonic waves. Meanwhile, the
The
The
The
Also, the
In the stereoscopic display unit, a three-dimensional display system such as a stereoscopic system (glasses system), an autostereoscopic system (no-glasses system), and a projection system (holographic system) can be applied.
The
The
In addition to vibration, the
The
The
The signal output from the
The
The identification module is a chip for storing various information for authenticating the use right of the
The
The
The
Meanwhile, as described above, the
In addition, the
The
In addition, the
As another example, the
In the following, various embodiments may be embodied in a recording medium readable by a computer or similar device using, for example, software, hardware, or a combination thereof.
Referring to FIGS. 1B and 1C, the disclosed
Here, the terminal body can be understood as a concept of referring to the
The
A
In some cases, electronic components may also be mounted on the
As shown, when the
These
The
Meanwhile, the
The
1B and 1C, a
However, these configurations are not limited to this arrangement. These configurations may be excluded or replaced as needed, or placed on different planes. For example, the
The
The
In addition, the
The
The touch sensor may be a film having a touch pattern and disposed between the
In this way, the
The first
The
The
The
The first and
In this figure, the
The contents input by the first and
On the other hand, a rear input unit (not shown) may be provided on the rear surface of the terminal body as another example of the
The rear input unit may be disposed so as to overlap with the
When a rear input unit is provided on the rear surface of the terminal body, a new type of user interface using the rear input unit can be realized. When the
Meanwhile, the
The
The
And a
The
The
And a second
The terminal body may be provided with at least one antenna for wireless communication. The antenna may be embedded in the terminal body or formed in the case. For example, an antenna constituting a part of the broadcast receiving module 111 (see FIG. 1A) may be configured to be able to be drawn out from the terminal body. Alternatively, the antenna may be formed in a film type and attached to the inner surface of the
The terminal body is provided with a power supply unit 190 (see FIG. 1A) for supplying power to the
The
The
The
Hereinafter, embodiments related to a control method that can be implemented in a mobile terminal configured as above will be described with reference to the accompanying drawings. It will be apparent to those skilled in the art that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
2 is a flowchart illustrating a method of controlling a mobile terminal according to the present invention.
Referring to FIG. 2, first, in response to the authentication information previously set for releasing the security state and the preset input method of the authentication information, input of the authentication information is requested with an input method different from the input method (S210) of outputting the time information to the
Specifically, the security state can be defined in various states requiring input of authentication information for information protection. As an embodiment, when the security state is released, the lock screen can be released, financial transaction proceeding, file downloading, execution of a specific application, viewing of a lock file, mail transmission, message browsing, and the like can be performed.
The authentication information to be input for releasing the security state can be set as a fingerprint, an iris, a password, a pattern, a signature, and the like. Also, the input method of the authentication information can be set by the position on the
According to step S210, fake time information requesting input of authentication information previously set to an input method different from the preset input method may be output.
In an embodiment, in order to release the security state, the user's right-hand index finger fingerprint may be set to be input at the bottom right of the
Then, the
As an embodiment, the security state can be released only when the user inputs the right-hand index finger fingerprint at the bottom right of the
In another embodiment, even if the user's right-hand index fingerprint is input to the fake input window, the secure state is not released. That is, the security state can be released only when the right-hand index finger fingerprint, which is previously set authentication information, is input to the preset position.
In another embodiment, the security state is not released even if a fingerprint other than the right-hand index finger fingerprint is input to any area of the
Hereinafter, specific embodiments will be described.
In an embodiment, the step S210 may include a step of, in correspondence with the first fingerprint information for releasing the security state and the first position at which the first fingerprint information is to be input, And outputting time information for requesting input of the fingerprint information.
In yet another embodiment, the step S220 may include maintaining the security state based on the input of the first fingerprint information at the second position, and based on the input of the first fingerprint information at the first position, And releasing the security state.
In yet another embodiment, the step S220 may include maintaining at least one fingerprint information different from the first fingerprint information and the at least one fingerprint information different from the first fingerprint information, And releasing the security state based on that the first fingerprint information is input in a predetermined order in the first position.
In still another embodiment, the step S210 may include outputting a guideline for the first position to be detected by the user.
In yet another embodiment, the step S220 may further include a step of, in response to the first fingerprint information for releasing the security state and the time period in which the first fingerprint information is input, The method may include maintaining the security state based on input of information, and releasing the security state based on input of the first fingerprint information within the time period.
In still another embodiment, the step S210 may include outputting time information for the time interval to be detected by the user.
In still another embodiment, the step S220 may include releasing the security state based on the simultaneous input of the first fingerprint information for releasing the security state and the at least one fingerprint information different from the first fingerprint information Step < / RTI >
In yet another embodiment, the step S210 may include the step of, in response to the first fingerprint information for releasing the security state and the first position at which the first fingerprint information is to be input, requesting input of authentication information different from the fingerprint information And outputting the time information.
In yet another embodiment, the step S220 may include maintaining the security state based on input of the authentication information different from the fingerprint information, and based on the input of the first fingerprint information at the first location, And releasing the state.
Hereinafter, in the embodiments referring to the drawings, the registered fingerprint is used in the same terms as the authenticated fingerprint and the unregistered fingerprint.
The
Then, the
In addition, the
3 is a conceptual diagram for explaining an embodiment in which authentication is completed when the fake input area is output.
Referring to FIG. 3, the request for fake authentication information according to the present invention can be used by switching the fake mode to an ON / OFF state. When the fake mode is ON, in a state where the
As an embodiment, the
Subsequently, the user can input a fingerprint (registered fingerprint) registered for authentication by touch input to the
As another embodiment, a guideline may be output so that it is easy for the user to judge the preset area. Specifically, when a user takes a finger to the
As the registered fingerprint is input to the lower
On the other hand, if the fake mode is OFF, the authentication procedure may proceed according to the existing method of inputting the fingerprint on the
4 is a conceptual diagram for explaining an embodiment in which authentication fails when outputting a fake input area.
Referring to FIG. 4, in the case where the fake mode is ON, the execution screen of a specific application for requesting fingerprint input for payment is output, as described in FIG. 3, The
Subsequently, the user can input a fingerprint (registered fingerprint) registered for authentication by touching the
Accordingly, after the
In another embodiment, the user inputs a touch input to the upper
Accordingly, after the
At this time, a guide line may be output so that the user can easily determine the preset area. Specifically, when a user takes a finger to the
In another embodiment, if an authentication error occurs more than a preset number of times, a
In another embodiment, when an unregistered fingerprint that is not a fingerprint (registration fingerprint) registered for authentication is input to the lower
5A to 5C are conceptual diagrams for explaining an embodiment in which a fake input window is output.
Referring to FIGS. 5A to 5C, a fake input window including a fake input area of a fingerprint may be output to an
May be output to the left
Referring to FIG. 5C, the user can input the registered fingerprint to complete the authentication by applying a touch input to the lower
In another embodiment, after the registered fingerprint is input to the fingerprint input area, authentication can be completed when the registered fingerprint is further input to the preset authentication area. According to this embodiment, it is possible to prevent remote inputting primarily, and to prevent illegal authentication by receiving inputs at a secondary preset position.
FIG. 6 is a conceptual diagram for explaining an embodiment for receiving a registration fingerprint in an authentication area.
Referring to FIG. 6, a registration fingerprint can be input by touch inputting a
After a
At this time, the guideline can be output as a straight line or a curve according to the position and size of the authentication area. As an embodiment, the user can easily distinguish the right
On the other hand, when an unregistered fingerprint is inputted or a registered fingerprint is inputted in an area other than the lower
As another embodiment, the user can easily distinguish the
On the other hand, when an unregistered fingerprint is input or a registered fingerprint is input in an area other than the
Meanwhile, the
7A to 7C are conceptual diagrams for explaining an embodiment in which an authentication fingerprint and an unauthenticated fingerprint are sequentially input.
7A to 7C, when at least one authentication fingerprint (registration fingerprint) registered for authentication and at least one unconfirmed fingerprint (unregistered fingerprint) are input in a predetermined order, authentication can be completed have. At this time, the authentication fingerprint can be input to the predetermined authentication area.
7A, a first registration fingerprint is input into a right
7B, an unregistered fingerprint is input to the
7C, the first registration fingerprint is input to the lower
At this time, the first registration fingerprint and the second registration fingerprint may be the same fingerprint or different fingerprint. The registration fingerprint is inputted twice and the unregistered fingerprint is inputted once in each of the above embodiments, but the present invention is not limited thereto. For example, if an unregistered fingerprint is input twice and a registered fingerprint is input once in a predetermined order, the authentication can be completed. At this time, the unregistered fingerprints may be the same or different.
The area to which the registered fingerprint is input may be a predetermined area (authentication area) or an arbitrary area as shown in Figs. 7A to 7C. For example, the authentication can be completed even when the registered fingerprint is input in an arbitrary area except the fake fingerprint input area in the predetermined order.
As another embodiment, an area in which an unregistered fingerprint is to be input may be preset. Specifically, as shown in FIG. 7A, when the first registration fingerprint, the unregistered fingerprint, and the second registration fingerprint are input in this order, the authentication may be completed only when the unregistered fingerprint is input to the authentication area that has been previously set.
FIG. 8 is a conceptual diagram for explaining an embodiment in which authentication is completed when the authentication method is set as described with reference to FIG. 7A.
Referring to FIG. 8, in the case where the fake mode is ON, as shown in FIG. 3, in a state in which the
As an embodiment, the
7A, the user inputs the first registration fingerprint into the right
Accordingly, a
FIG. 9 is a conceptual diagram for explaining an embodiment in which authentication fails when the authentication method is set as described in FIG. 7A.
Referring to FIG. 9, in the case where the fake mode is ON, as shown in FIG. 3, in a state in which an
As an embodiment, the
Unlike the authentication method previously described with reference to FIG. 7A, when a registration fingerprint or an unregistered fingerprint is input to the
If authentication fails, the chance of re-entering the fingerprint can be given a predetermined number of times. For example, if the fingerprint has been re-entered 3 times but the authentication has failed, a
In response to the first fingerprint information for releasing the security state and the time period in which the first fingerprint information is to be input, the
At this time, the
FIG. 10 is a conceptual diagram for explaining an embodiment in which a fingerprint is inputted in a time interval other than a predetermined time period and authentication fails.
10, an
As an embodiment, a
At this time, the input method of the authentication information may be set so that the registered fingerprint is authenticated only when the registered fingerprint is input to the
Accordingly, even when the registered fingerprint is input to the
FIG. 11 is a conceptual diagram for explaining an embodiment in which a fingerprint is input in a predetermined time interval and authentication is completed.
Referring to FIG. 11, a
As an embodiment, a
At this time, the input method of the authentication information may be set so that the registered fingerprint is authenticated only when the registered fingerprint is input to the
Accordingly, when the registered fingerprint is input to the
On the other hand, the
12A to 12C are conceptual diagrams for explaining an embodiment in which a fingerprint input window including a plurality of fingerprint input areas is output.
12A to 12C, a fingerprint input window including a registered fingerprint input area and an unregistered fingerprint input area may be output to an
May be output to the
13 is a conceptual diagram for explaining an embodiment in which a registration fingerprint and an unregistered fingerprint are input into a plurality of fingerprint input areas and authentication is completed.
13, an
Accordingly, when the authentication fingerprint is input to the first
In another embodiment, when an un-authenticated fingerprint is input to the first
On the other hand, even when the authentication fingerprint is input to the first
In response to the first fingerprint information for releasing the security state and the first position at which the first fingerprint information is to be input, the
Accordingly, the
14 is a conceptual diagram for explaining an embodiment in which authentication is completed by inputting a registration fingerprint on a password lock screen.
Referring to FIG. 14, a
As an example, after a
According to the embodiment of FIG. 14, in order to release the lock screen, the authentication fingerprint must be input to the
15 is a conceptual diagram for explaining an embodiment in which authentication is completed by inputting a registration fingerprint on a pattern lock screen.
Referring to FIG. 15, a
As an example, after a
According to the embodiment of FIG. 15, in order to release the lock screen, the authentication fingerprint is input to the
Hereinafter, a further embodiment related to the release of the lock screen will be described.
16 is a conceptual diagram for explaining an embodiment in which authentication is completed when knock code is input and fake input area is output.
Referring to FIG. 16, when a tapping
In another embodiment, when a registered fingerprint is input to the fake
On the other hand, the unlocked fingerprint is displayed on the input screen regardless of the input area. For example, when an unregistered fingerprint is input in the
FIG. 17 is a conceptual diagram for explaining an embodiment in which authentication is completed when a knock code is input and a fingerprint input area is output. FIG.
Referring to FIG. 17, when a tapping
In another embodiment, when an unregistered fingerprint is input to the
When the registered fingerprint is input to the
As another embodiment, when a registered fingerprint is input to an area other than the
At this time, the chance of re-input can be given a predetermined number of times. For example, if authentication fails more than four times, a lock screen is output.
Effects of the mobile terminal and the control method according to the present invention will be described as follows.
According to at least one of the embodiments of the present invention, there is an advantage that security can be enhanced by requesting input of authentication information in a manner different from an authentication information input method previously set for security release.
Also, according to at least one of the embodiments of the present invention, there is an advantage that the efficiency of the authentication process can be enhanced by blocking illegal authentication step by step.
The present invention described above can be embodied as computer-readable codes on a medium on which a program is recorded. The computer readable medium includes all kinds of recording devices in which data that can be read by a computer system is stored. Examples of the computer readable medium include a hard disk drive (HDD), a solid state disk (SSD), a silicon disk drive (SDD), a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, , And may also be implemented in the form of a carrier wave (e.g., transmission over the Internet). Also, the computer may include a
100: mobile terminal
110:
120: Input unit
140: sensing unit
150:
160:
170: memory
180:
190: Power supply
Claims (20)
And a control unit for maintaining the security state based on input of the authentication information in the different input method and releasing the security state based on input of the authentication information in the previously set input method The mobile terminal comprising:
The display unit includes:
A first fingerprint information for canceling the security state and a first position at which the first fingerprint information is to be input, a time information requesting input of the first fingerprint information at a second position different from the first position, To the mobile terminal.
Wherein,
Wherein the secure state is maintained based on the input of the first fingerprint information at the second location and the secure state is released based on the input of the first fingerprint information at the first location terminal.
Wherein,
Wherein the first fingerprint information is maintained in the secure state based on the input of the first fingerprint information at the second position, and at least one fingerprint information different from the first fingerprint information, The mobile terminal releases the security state based on that the mobile terminal is input according to the security state.
The display unit includes:
And outputs a guide line for detecting the first position by the user.
Wherein,
The security state is maintained based on the first fingerprint information for releasing the security state and the first fingerprint information at a time other than the time interval corresponding to a time interval in which the first fingerprint information is input And releases the security state based on input of the first fingerprint information within the time period.
The display unit includes:
And outputs time information for detecting the time interval by the user.
Wherein,
And releases the security state based on the simultaneous input of first fingerprint information for releasing the security state and at least one fingerprint information different from the first fingerprint information.
The display unit includes:
And outputs time information for requesting input of authentication information different from fingerprint information in correspondence with the first fingerprint information for releasing the security state and the first position at which the first fingerprint information is to be input, .
Wherein,
Wherein the secure state is maintained based on input of authentication information different from the fingerprint information, and the secure state is released based on the input of the first fingerprint information at the first location.
(b) maintaining the security state based on input of the authentication information in the different input method, and releasing the security state based on input of the authentication information in the previously set input method; And controlling the mobile terminal based on the control information.
The step (a)
A first fingerprint information for canceling the security state and a first position at which the first fingerprint information is to be input, a time information requesting input of the first fingerprint information at a second position different from the first position, And outputting the control signal to the mobile terminal.
The step (b)
And maintaining the security state based on the input of the first fingerprint information at the second position and releasing the security state based on the input of the first fingerprint information at the first position Wherein the mobile terminal is a mobile terminal.
The step (b)
Wherein the first fingerprint information is maintained in the secure state based on the input of the first fingerprint information at the second position, and at least one fingerprint information different from the first fingerprint information, And releasing the security state based on the input of the security state.
The step (a)
And outputting a guide line for detecting the first position by a user.
The step (b)
The security state is maintained based on the first fingerprint information for releasing the security state and the first fingerprint information at a time other than the time interval corresponding to a time interval in which the first fingerprint information is input And releasing the security state based on input of the first fingerprint information within the time period.
The step (a)
And outputting time information for detecting the time interval by the user.
The step (b)
And releasing the security state based on that the first fingerprint information for releasing the security state and the at least one fingerprint information different from the first fingerprint information are input at the same time, Control method.
The step (a)
And outputting time information for requesting input of authentication information different from fingerprint information in correspondence with the first fingerprint information for releasing the security state and the first position at which the first fingerprint information is to be input Wherein the mobile terminal is a mobile terminal.
The step (b)
And releasing the security state based on input of the first fingerprint information at the first position while maintaining the security state based on input of authentication information different from the fingerprint information, To the mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150091490A KR20170001468A (en) | 2015-06-26 | 2015-06-26 | Mobile terminal and method for controlling the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150091490A KR20170001468A (en) | 2015-06-26 | 2015-06-26 | Mobile terminal and method for controlling the same |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170001468A true KR20170001468A (en) | 2017-01-04 |
Family
ID=57831814
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150091490A KR20170001468A (en) | 2015-06-26 | 2015-06-26 | Mobile terminal and method for controlling the same |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170001468A (en) |
-
2015
- 2015-06-26 KR KR1020150091490A patent/KR20170001468A/en unknown
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20160092363A (en) | Mobile terminal and method for controlling the same | |
KR20170003193A (en) | Mobile terminal and method for controlling the same | |
KR20170027189A (en) | Mobile terminal and control method for the mobile terminal | |
KR20170011617A (en) | Mobile terminal and control method for the mobile terminal | |
KR20160143135A (en) | Mobile terminal and method for controlling the same | |
KR20170020075A (en) | Mobile terminal and method for controlling the same | |
KR20170037158A (en) | Mobile terminal and method for controlling the same | |
KR20160095409A (en) | Mobile terminal and method for controlling the same | |
KR101602269B1 (en) | Mobile terminal and control method for the mobile terminal | |
KR101545487B1 (en) | Mobile terminal and method for controlling the same | |
KR20170021514A (en) | Display apparatus and controlling method thereof | |
KR20170004706A (en) | Iris identification apparatus of mobile terminal and controlling mrthod thereof | |
KR101622730B1 (en) | Mobile terminal and method for controlling the same | |
KR101604814B1 (en) | Mobile terminal and control method thereof | |
KR20170082229A (en) | Mobile terminal and method for controlling the same | |
KR20170037431A (en) | Mobile terminal and control method for the mobile terminal | |
KR20160067542A (en) | Mobile terminal and method for controlling the same | |
KR20160053691A (en) | Mobile terminal and method for controlling the same | |
KR20160148959A (en) | Mobile terminal and method for controlling the same | |
KR20160036394A (en) | Mobile terminal and screen unlocking method thereof | |
KR101688167B1 (en) | Mobile terminal and method for controlling the same | |
KR20170119955A (en) | Mobile terminal | |
KR20160120567A (en) | Mobile terminal and method for controlling the same | |
KR20160077907A (en) | Mobile terminal and method for controlling the same | |
KR20170060961A (en) | Smart home appliances system, repeater using the smart home applicances system and mobile terminal |