KR20150042648A - Method for Operating Function based on Fingerprint Recognition & User Input and Electronic Device using the same - Google Patents

Method for Operating Function based on Fingerprint Recognition & User Input and Electronic Device using the same Download PDF

Info

Publication number
KR20150042648A
KR20150042648A KR20130121549A KR20130121549A KR20150042648A KR 20150042648 A KR20150042648 A KR 20150042648A KR 20130121549 A KR20130121549 A KR 20130121549A KR 20130121549 A KR20130121549 A KR 20130121549A KR 20150042648 A KR20150042648 A KR 20150042648A
Authority
KR
South Korea
Prior art keywords
input
user
fingerprint
function
electronic device
Prior art date
Application number
KR20130121549A
Other languages
Korean (ko)
Inventor
문운홍
Original Assignee
모지도코화이어코리아 유한회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 모지도코화이어코리아 유한회사 filed Critical 모지도코화이어코리아 유한회사
Priority to KR20130121549A priority Critical patent/KR20150042648A/en
Publication of KR20150042648A publication Critical patent/KR20150042648A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

Provided are a method for operating a function based on a combination of fingerprint recognition and user operation information and an electronic device using the same. According to an embodiment of the present invention, a method for operating a function includes receiving additional operation from a user in a state where a fingerprint is input from the user, and when user authentication by the input fingerprint is successful, executing a function matched to the received operation. Accordingly, security may be strengthened and operating convenience may be obtained by executing directly a function desired by a user while authenticating the user through fingerprint recognition. Waiting time by the function execution may also be reduced by directing quickly the function execution.

Description

TECHNICAL FIELD [0001] The present invention relates to a method of executing a function based on a combination of fingerprint recognition and user manipulation contents,

BACKGROUND OF THE INVENTION 1. Field of the Invention [0002] The present invention relates to the execution of functions, and more particularly, to a method of executing a desired function among various functions provided in an electronic device and an application, and an electronic apparatus using the same.

The move to enhance security by installing fingerprint recognition function on mobile devices has been continued, and smart phones with domestic and foreign smartphones have already been equipped with fingerprint recognition function.

However, the fingerprint recognition function until now has been used only for the simple purpose of releasing the lock screen, and it has not been able to obtain a great response of the users. In other words, while the technology has developed, the mobile device has performed various functions, but the application of the fingerprint recognition can not be followed.

Accordingly, it is required to search for a method for providing diversity and convenience to users through various applications of fingerprint recognition while utilizing security, which is an advantage of fingerprint recognition.

SUMMARY OF THE INVENTION The present invention has been made in order to solve the above-mentioned problems, and it is an object of the present invention to provide a fingerprint authentication method, a fingerprint authentication method, And an electronic apparatus using the same.

According to an aspect of the present invention, there is provided a method for executing a function, the method comprising: a first input step of an electronic device receiving a fingerprint from a user; A second input step in which the electronic device receives an operation from the user in a state in which the first input step is performed; And executing a function matched to the operation input through the second input step if the user authentication by the fingerprint inputted through the first input step is successful.

The user's hand for input in the first input step and the user's hand for input in the second input step may be the same.

In addition, the user's finger for input in the first input step and the user's finger for input in the second input step may be the same.

The operation may be an operation for moving the electronic device, and the function may be a function matched to a movement pattern input by the operation.

Further, the operation is an operation of holding a fingerprint input in the first input step, and the function may be a function matched with a time at which the fingerprint input is maintained by the operation.

The operation may be an operation of inputting a button of the electronic device, and the function may be a function matched to a button input by the operation.

Further, the operation is an operation of touching the screen of the electronic device, and the function may be a function matched to the number of touches input by the operation.

The operation may be an operation of inputting voice by the electronic device, and the function may be a function matched with the voice input by the operation.

The function matched to the operation input through the second input step may include at least one of a function provided by the middleware of the electronic device, a function of executing an application installed in the electronic device, and a function provided by the application .

According to another aspect of the present invention, there is provided an electronic device including: a fingerprint sensor that receives a fingerprint from a user; And a processor for receiving an operation from the user in a state where the fingerprint is input by the fingerprint sensor and executing a function matched to the input operation if the user is successfully authenticated by the input fingerprint.

As described above, according to the embodiments of the present invention, the user can perform the desired functions simultaneously with the user authentication by the fingerprint recognition, thereby enhancing security and facilitating the operation. In addition, the function execution can be promptly instructed, and the waiting time until the function execution is reduced.

In general, the security and convenience of use are in inverse relationship, but the embodiments of the present invention are very useful because they maximize the convenience without sacrificing security.

BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a flowchart showing a method of inputting a fingerprint and a motion together to perform user authentication and function execution together according to an embodiment of the present invention;
FIG. 2 is a table illustrating a security pattern of a mobile wallet application matched with movement patterns that a user can input by moving the mobile device,
FIG. 3 is a view showing, in detail, the input method of some of the movement patterns illustrated in FIG. 2;
4 is a flowchart provided in the description of a method of performing user authentication and function execution together by fingerprint input and an operation of keeping the input for a specific time according to another embodiment of the present invention;
5 is a flowchart showing a method of inputting fingerprints and buttons together to perform user authentication and function execution together according to another embodiment of the present invention;
FIG. 6 is a flowchart illustrating a method of simultaneously performing a user authentication and a function execution by inputting a fingerprint and a screen touch together according to another embodiment of the present invention. FIG.
7 is a flowchart showing a method of inputting a fingerprint and a voice together to perform user authentication and function execution according to another embodiment of the present invention;
8 is a block diagram of a mobile device according to another embodiment of the present invention,
9 is a diagram illustrating a fingerprint sensor installable area in a mobile device.

Hereinafter, the present invention will be described in detail with reference to the drawings.

In the embodiments of the present invention, the fingerprint input for fingerprint recognition and the operation for performing the function are input from the user at the same time, and the user performs the desired function in the subsequent procedure at the time of user authentication, Explain the various ways to pursue.

1. Authentication & function execution by fingerprint & motion input

BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a flowchart provided in a description of a method for simultaneously inputting a fingerprint and a motion to perform user authentication and function execution according to an embodiment of the present invention; In this embodiment, a process of performing security-required functions in the mobile wallet application will be described.

As shown in FIG. 1, a mobile wallet application installed in a mobile device is executed by a user's command (S110). This allows the user to utilize various functions (inquiry, use, etc.) in the mobile wallet application.

Among the functions provided in the Mobile Wallet application are security-required features. In order to immediately execute a function requiring security, the user must perform fingerprint input (S120) and motion input (S130) together.

The fingerprint input in step S120 is performed by the user's finger touching the fingerprint sensor of the mobile device, and the movement input in step S130 is performed by the user moving the mobile device in a specific pattern.

However, since it is assumed that steps S120 and S130 are performed together, the user is required to move the mobile device in a specific pattern while holding a finger on the fingerprint sensor.

The mobile wallet application recognizes the fingerprint of the user inputted in step S120 and compares the fingerprint with the fingerprint of the user registered in step S150 to authenticate the user.

If it is determined that the mobile wallet application does not coincide with the result of the comparison in step S150 (S155-N), the mobile wallet application may display a fingerprint mismatch message to guide the user or end the algorithm shown in FIG. No matter what the way, no subsequent function is performed.

On the other hand, if it is determined in step S150 that the two mobile stations coincide with each other (S155-Y), the mobile wallet application executes a function matched with the motion input in step S130.

To this end, the mobile wallet application recognizes the movement inputted in the step S130 (S170), determines a movement pattern (S180-1, S180-2, ... S180-n) (S190-1, S190-2, ... S190-n).

FIG. 2 illustrates movement patterns that a user can input by moving a mobile device and security functions of a mobile wallet application matched with the movement patterns. 3, the input method of some of the motion patterns illustrated in FIG. 2 is shown in more detail.

The matching table shown in Fig. 2 is merely an example. The proposed matching relationship can be changed, added and deleted according to the setting of the user. This also applies to the movement pattern and the function. That is, the movement patterns and functions shown in FIG. 2 can be changed and deleted according to the setting of the user, and can be added.

In addition, in the case of a movement pattern, the pattern drawing direction can be set differently for left-handed and right-handed persons. For example, in the case of a horizontal pattern, right-handed is a pattern moving from left to right, and left-handed is a pattern moving from right to left. In the case of the circular pattern, it is possible to set each of the right-handed pattern moving in the counterclockwise direction and the left-handed pattern moving in the clockwise direction.

In order to prevent the functions shown in Fig. 2 from being provided to a user other than the user, user authentication by fingerprint recognition is required. For other functions (e.g., environment setting, help, etc.) for which security is not required other than the above functions, it is possible to implement the function execution only by inputting the movement to the mobile device without fingerprint input for user authentication.

On the other hand, only one fingerprint registration required for fingerprint verification in step S150 is sufficient. However, in case the unexpected error continues to occur in the fingerprint recognition in step S140, or the fingerprint is difficult to be recognized (in the case where a foreign substance is on the finger or a wound occurs), the preparatory fingerprint may be further registered.

In the above embodiment, the functions to be performed assume functions executed in the mobile wallet application, for convenience of explanation and explanation. That is, the technical idea of the present invention can be applied to other functions requiring security in addition to the functions executed in the mobile wallet application. For example, when executing the functions provided by the middleware of the mobile device (the phone book function, the camera album function, the NFC function, and the like) and executing the application installed in the mobile device (the mobile wallet application, Etc.), but also in other cases, the technical idea of the present invention can be applied.

2. Authentication & function execution by fingerprint input & maintenance

4 is a flow chart provided in the description of a method for performing user authentication and function execution together by fingerprint input and an operation of keeping the input for a specific time according to another embodiment of the present invention.

As shown in FIG. 4, after executing the mobile wallet application (S210), the user must input the fingerprint and hold the input for a specific time in order to immediately execute the function requiring security (S220).

In step S220, the fingerprint input is an operation in which the user places a finger on the fingerprint sensor of the mobile device, and the input maintenance is an operation in which the user continues to finger the fingerprint sensor for a predetermined time.

Since the user authentication procedure (S230 to S260) using the fingerprint of the user input through step S220 is the same as that of the above-described embodiment, a detailed description thereof will be omitted.

When the user authentication is successful (S250-Y), the mobile wallet application measures the time at which the fingerprint input is maintained in S220, determines the input holding time (S280-1, S280-2, ... S280- n), and performs a function matched with the determined input holding time (S290-1, S290-2, ... S290-n).

The function execution method according to the present embodiment is the same as the above-described embodiment, in addition to the functions executed in the mobile wallet application, to other functions requiring security.

For example, if 1) fingerprint input is kept for 1 second, 'phone book function' is executed, 2) if fingerprint input is kept for '2 seconds', 'camera album function' is executed .. n) It is possible to implement 'mobile wallet application' if the fingerprint input is held for 'n seconds'.

3. Authentication & function execution by fingerprint & button input

5 is a flowchart provided in a description of a method of inputting a fingerprint and a button together to perform user authentication and function execution according to another embodiment of the present invention.

As shown in FIG. 5, after executing the mobile wallet application (S310), the user must perform the fingerprint input (S320) and the button input (S330) together to immediately execute the function requiring security.

The fingerprint input in step S320 is performed by the user's finger touching the fingerprint sensor of the mobile device. The input of the button in step S330 is performed using a virtual graphic button (number, letter, symbol, etc.) displayed on the touch screen of the mobile device ) 'Or' physical button provided in the case of the mobile device '.

However, since steps S320 and S330 are concurrently performed, the user is required to press the button while holding his / her finger on the fingerprint sensor.

The user authentication procedure (S340 to S360) using the fingerprint of the user input through step S320 is the same as that of the above-described embodiment, and thus a detailed description thereof will be omitted.

When the user authentication is successful (S355-Y), the mobile wallet application recognizes the button input in S330 (S370), determines the type of the input button (S380-1, S380-2, ... S380-n ), And executes a function matched to the identified button (S390-1, S390-2, ... S390-n).

The function execution method according to the present embodiment is the same as the above-described embodiments, in addition to the functions executed in the mobile wallet application, to other functions requiring security.

For example, 1) 'Phone book function' is executed when 'P button' is input, 2) 'Camera album function' is executed when 'A button' is input, and ... n) 'Is entered, it is possible to implement' Mobile Wallet Application '.

4. Execute authentication & function by fingerprint & screen touch input

FIG. 6 is a flowchart illustrating a method of simultaneously performing a user authentication and a function execution by inputting a fingerprint and a screen touch together according to another embodiment of the present invention.

As shown in FIG. 6, after executing the mobile wallet application (S410), the user must perform the fingerprint input (S420) and the screen touch (S430) together to immediately execute the function requiring security.

The fingerprint input in step S420 is performed by the user touching the fingerprint sensor of the mobile device, and the screen touch in step S430 is performed by touching the touch screen screen of the mobile device for a specific number of times.

However, since it is assumed that steps S420 and S430 are performed together, the user is required to touch the touch screen screen for a specific number of times while the finger is touched with the fingerprint sensor.

The user authentication procedures (S440 to S460) using the fingerprint of the user input through step S420 are the same as those of the above-described embodiment, and thus a detailed description thereof will be omitted.

When the user authentication is successful (S455-Y), the mobile wallet application measures the number of screen touches in step S430 (S470), grasps the number of touches (S480-1, S480-2, ... S480-n) (S490-1, S490-2, ... S490-n).

The function execution method according to the present embodiment is the same as the above-described embodiments, in addition to the functions executed in the mobile wallet application, to other functions requiring security.

For example, if 1) the screen is touched 'once', 'phone book function' is executed, 2) if the screen is touched 'twice', 'camera album function' It is possible to implement 'mobile wallet application' when it is touched 'n times'.

5. Authentication & function by fingerprint & voice input

7 is a flowchart illustrating a method of inputting a fingerprint and a voice together to perform user authentication and function execution according to another embodiment of the present invention.

As shown in FIG. 7, after executing the mobile wallet application (S510), the user must perform fingerprint input (S520) and voice input (S530) in order to immediately execute a function requiring security.

The fingerprint input at step S520 is performed by the user's finger touching the fingerprint sensor of the mobile device, and the voice input at step S530 is performed by the voice of the mobile device.

However, since it is assumed that steps S520 and S530 are performed together, the user is required to input a voice to the microphone in a state in which the finger is placed on the fingerprint sensor.

The user authentication procedures (S540 to S560) using the fingerprint of the user input through step S520 are the same as those of the above-described embodiment, and thus a detailed description thereof will be omitted.

When the user authentication is successful (S555-Y), the mobile wallet application recognizes the voice inputted in the step S530 (S570), grasps the voice contents (S580-1, S580-2, ... S580-n) (S590-1, S590-2, ... S590-n).

The function execution method according to the present embodiment is the same as the above-described embodiments, in addition to the functions executed in the mobile wallet application, to other functions requiring security.

For example, if 1) the input voice is 'phone book', 'phone book function' is executed, 2) if the input voice is 'album', 'camera album function' If the input voice is 'wallet', it is possible to implement 'mobile wallet application'.

6. Configuration of mobile device

A block diagram of a mobile device to which the above-described embodiments are applicable is shown in Fig. 8, the mobile device 600 includes a communication unit 610, a touch screen 620, a camera 630, a fingerprint sensor 640, a processor 650, a storage unit 660, A motion sensor 670, a user input unit 680, and a microphone 690. [

The communication unit 610 is a means for mobile communication and wireless networking, and the camera 630 is means for generating an image through shooting.

The touch screen 620 functions as a display for displaying a function execution result and graphic buttons, and as an input means for receiving user operations such as touch, slide, and flicker.

The fingerprint sensor 640 is a means for receiving a fingerprint of a user and the movement sensor 670 is a means for sensing movement of the mobile device 600 by a user. The user input unit 680 is located in a case of the mobile device 600, which is a physical button that is positioned to receive a user command. The microphone 690 is means for receiving a user voice.

Meanwhile, the fingerprint sensor 640 can be installed at various positions of the mobile device 600. Specifically, when the user grips the mobile device 600, the fingerprint sensor 640 can be installed in an area where the finger can touch.

Areas in which the fingerprint sensor 640 can be installed are indicated by hatching in an exploded view of the mobile device 600 shown in Fig. In FIG. 6, the fingerprint sensor 640 may be installed on the case of the mobile device 600, or may be installed in the user input portion 680, that is, within a physical button region.

Referring again to FIG. The authentication and function execution algorithms shown in FIG. 1 and FIGS. 4 to 7 are stored in the storage unit 660, which may be created and stored in a separate program, included in a mobile wallet application or an operating system (OS) Quot;

The processor 650 executes the corresponding function in accordance with the authentication & function execution algorithm shown in Figs. 1 and 4-7. Accordingly, the processor 650 can perform authentication and function based on 1) the fingerprint sensor 640 and the movement sensor 670, and 2) the authentication and function execution based on the fingerprint sensor 640 and the movement pattern of the mobile device 600, 3) execution of authentication and function based on the 'fingerprint' and 'fingerprint input retention time' identified as the fingerprint 640 and 3) fingerprints and fingerprints detected by the fingerprint sensor 640 and the touch screen 620 / user input unit 680, Execution of authentication & function based on 'fingerprint' and 'number of screen touches' identified by fingerprint sensor 640 and touch screen 620, and 5) execution of fingerprint sensor 640 and the microphone 690 and performs the authentication & function execution based on the " voice content ".

7. Variation example

Methods for inputting a fingerprint for fingerprint recognition and an operation for executing a function at the same time from a user and executing a function desired by a user in a subsequent procedure at the time of user authentication have been described in detail above with reference to preferred embodiments.

In the above embodiments, '1. Fingerprint & motion input method ',' 2. Fingerprint input & hold 'and' 5. Fingerprint & voice input method 'can perform user authentication and function using only one hand. Especially, '2. Fingerprint input & hold method 'can use two fingers with one finger for user authentication and function execution. Meanwhile, '3. Fingerprint & button input method 'and' 4. Fingerprint & screen touch input method ', it is common to use two hands, but one hand may be used depending on the position of the fingerprint sensor.

The methods mentioned in the above embodiments may be implemented separately, but it is also possible to combine two or more methods. For example, 'fingerprint & button & voice input method' can be assumed.

The technical idea of the present invention is not limited to mobile devices. The technical idea of the present invention is applicable not only to stationary devices but also to all other electronic devices.

It goes without saying that the technical idea of the present invention can also be applied to a computer-readable recording medium having a computer program for performing the functions of the apparatus and method according to the present embodiment. In addition, the technical idea according to various embodiments of the present invention may be embodied in computer-readable code form recorded on a computer-readable recording medium. The computer-readable recording medium is any data storage device that can be read by a computer and can store data. For example, the computer-readable recording medium may be a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical disk, a hard disk drive, or the like. In addition, the computer readable code or program stored in the computer readable recording medium may be transmitted through a network connected between the computers.

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments, but, on the contrary, It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention.

600: mobile device 620: touch screen
640: fingerprint sensor 650: processor
670: Motion sensor 680: User input
690: microphone

Claims (10)

A first input step of the electronic device receiving a fingerprint from a user;
A second input step in which the electronic device receives an operation from the user in a state in which the first input step is performed; And
And executing a function matched to the operation input through the second input step when the user authentication by the fingerprint inputted through the first input step is successful.
The method according to claim 1,
Wherein the user's hand for input in the first input step and the user's hand for input in the second input step are the same.
3. The method of claim 2,
Wherein the user's finger for input in the first input step and the user's finger for input in the second input step are the same.
The method according to claim 1,
Wherein the operation is an operation for moving the electronic device,
Wherein the function is a function matched to a pattern of movement inputted by the operation.
The method according to claim 1,
Wherein the operation is an operation for holding a fingerprint input in the first input step,
Wherein the function is a function matched with a time at which the fingerprint input is maintained by the operation.
The method according to claim 1,
Wherein the operation is an operation of inputting a button of the electronic device,
Wherein the function is a function matched to a button input by the operation.
The method according to claim 1,
Wherein the operation is an operation of touching a screen of the electronic device,
Wherein the function is a function matched to the number of touches input by the operation.
The method according to claim 1,
Wherein the operation is an operation of inputting a voice with the electronic device,
Wherein the function is a function matched to the voice inputted by the operation.
The method according to claim 1,
Wherein the function matched to the operation input through the second input step comprises:
A function provided by the middleware of the electronic device, a function of executing an application installed in the electronic device, and a function provided by an application.
A fingerprint sensor for receiving a fingerprint from a user; And
And a processor for receiving an operation from the user in a state in which the fingerprint is input by the fingerprint sensor, and executing a function matched to the input operation if the user is successfully authenticated by the input fingerprint.
KR20130121549A 2013-10-11 2013-10-11 Method for Operating Function based on Fingerprint Recognition & User Input and Electronic Device using the same KR20150042648A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR20130121549A KR20150042648A (en) 2013-10-11 2013-10-11 Method for Operating Function based on Fingerprint Recognition & User Input and Electronic Device using the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR20130121549A KR20150042648A (en) 2013-10-11 2013-10-11 Method for Operating Function based on Fingerprint Recognition & User Input and Electronic Device using the same

Publications (1)

Publication Number Publication Date
KR20150042648A true KR20150042648A (en) 2015-04-21

Family

ID=53035647

Family Applications (1)

Application Number Title Priority Date Filing Date
KR20130121549A KR20150042648A (en) 2013-10-11 2013-10-11 Method for Operating Function based on Fingerprint Recognition & User Input and Electronic Device using the same

Country Status (1)

Country Link
KR (1) KR20150042648A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10223692B2 (en) 2012-11-28 2019-03-05 Mozido Corfire-Korea, LTD. Method for setting temporary payment card and mobile device applying the same
KR20200080809A (en) * 2018-12-27 2020-07-07 엔에이치엔고도 주식회사 Method for Executing Function of Mobile Terminal by Using Facial Recognition
US10754938B2 (en) 2016-06-01 2020-08-25 Samsung Electronics Co., Ltd. Method for activating function using fingerprint and electronic device including touch display supporting the same

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10223692B2 (en) 2012-11-28 2019-03-05 Mozido Corfire-Korea, LTD. Method for setting temporary payment card and mobile device applying the same
US10754938B2 (en) 2016-06-01 2020-08-25 Samsung Electronics Co., Ltd. Method for activating function using fingerprint and electronic device including touch display supporting the same
KR20200080809A (en) * 2018-12-27 2020-07-07 엔에이치엔고도 주식회사 Method for Executing Function of Mobile Terminal by Using Facial Recognition

Similar Documents

Publication Publication Date Title
US10824707B2 (en) Method and device for providing security content
KR102299261B1 (en) Method of controlling lock state of applications and electronic device supporting the same
CN105975182B (en) A kind of terminal operation method and terminal
KR101957615B1 (en) Fingerprint authentication method and system, and terminal supporting fingerprint authentication
US10831874B2 (en) Information processing apparatus, information processing method and program
US20180310171A1 (en) Interactive challenge for accessing a resource
US20140181962A1 (en) Application executing method using fingerprint recognition, device therefor, and computer readable recording medium therefor
US20180048641A1 (en) Identity authentication method and apparatus
US8769669B2 (en) Method and apparatus to authenticate a user to a mobile device using mnemonic based digital signatures
US20170053109A1 (en) Mobile terminal and method for controlling the same
US9207850B2 (en) Application executing method using fingerprint recognition, device therefor, and computer readable recording medium therefor
US20200026939A1 (en) Electronic device and method for controlling the same
KR101556599B1 (en) Pattern Inputting Apparatus and Method, and Recording Medium Using the Same
US20150363591A1 (en) Method of activate upon authentication of electronic device
JP2014160465A (en) Apparatus and method for managing security of terminal
KR20150042648A (en) Method for Operating Function based on Fingerprint Recognition & User Input and Electronic Device using the same
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
KR101435487B1 (en) User device, method of using hidden page of the same and computer-readable recording medium
US10380331B2 (en) Device authentication
JP6852508B2 (en) Mobile terminal devices, their authentication methods, and programs
JP2020144701A (en) Biometric authentication device, biometric authentication system, and program
JP5611380B2 (en) Terminal device, input control method, and program
KR101462227B1 (en) File management method, device and computer-readable storage using fingerprint
KR20150034074A (en) Setting security method, electronic apparatus and computer-readable storage using fingerprint authentication and other security setting method
JP2013246567A (en) Information processing device, authentication method, and program

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E90F Notification of reason for final refusal
N231 Notification of change of applicant
E701 Decision to grant or registration of patent right