KR20150075987A - Method for processing security and an electronic device thereof - Google Patents

Method for processing security and an electronic device thereof Download PDF

Info

Publication number
KR20150075987A
KR20150075987A KR1020130164493A KR20130164493A KR20150075987A KR 20150075987 A KR20150075987 A KR 20150075987A KR 1020130164493 A KR1020130164493 A KR 1020130164493A KR 20130164493 A KR20130164493 A KR 20130164493A KR 20150075987 A KR20150075987 A KR 20150075987A
Authority
KR
South Korea
Prior art keywords
electronic device
identification information
communication
security
module
Prior art date
Application number
KR1020130164493A
Other languages
Korean (ko)
Inventor
이종필
김영해
Original Assignee
삼성전자주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 삼성전자주식회사 filed Critical 삼성전자주식회사
Priority to KR1020130164493A priority Critical patent/KR20150075987A/en
Publication of KR20150075987A publication Critical patent/KR20150075987A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

According to one embodiment of the present invention, a security processing method for a first electronic device may comprise the steps of: requesting a second electronic device to transmit first identification information on the second electronic device via first wireless local area communications; receiving the first identification information from the second electronic device via second wireless communications, which are identical to, or different from, the first wireless local area communications; and changing the received first identification information to conform to a predetermined scheme and setting the information changed to conform to the predetermined scheme as a first passcode with a security attribute. Being not limited to the method described above, other embodiments are possible for a security processing method for an electronic device within an identical or similar range of the present invention.

Description

TECHNICAL FIELD [0001] The present invention relates to a security processing method,

Various embodiments of the present invention are directed to a method and an electronic device for setting up a security environment and handling security in an electronic device.

As electronic devices such as smart phones have become increasingly complicated and increasingly used in everyday life, security problems have arisen accordingly, various security mode operations have been implemented, and a user has frequently performed setting or revoking security levels do. Examples of the security mode operation include a screen locking function using a password setting or a pattern setting function, a restriction function for executing an application using a password setting or a pattern setting, a document using a password setting or a pattern setting, an MP3, an image file, etc. Limit access to important configuration items when configuring the environment, and restrict downloading of applications from other sources other than the server when installing the application.

In setting the security environment, the electronic device may set the passcode, which is designated through the electronic device or the biometric information of the user, to the data specified in the electronic device or the security of the designated system. The electronic device may receive the pass code designated at the time of accessing the secured data or the system, and the pass code or the personal information may be exposed in releasing the security.

The electronic device 101 may receive identification information of one or more other electronic devices connected via a network communication to set the security environment in the designated system or data specified in the electronic device. The electronic device may receive security-designated designated data or identification information corresponding to a time point when the designated system is accessed, thereby performing security release or security authentication.

According to one embodiment of the present invention, there is provided a method of operating a first electronic device, comprising: requesting a second electronic device to transmit first identification information of the second electronic device via a first short range communication; Receiving the first identification information from the second electronic device in a second short-range communication, which is the same as or different from the first short-range communication; and changing the received first identification information in a predetermined manner, 1 < / RTI >

According to an embodiment of the invention, there is provided a first electronic device, comprising: a memory for storing one or more pieces of identification information received; a second electronic device for transmitting the first identification information of the second electronic device to a first short- Communication with the second electronic device, receiving the first identification information from the second electronic device in a second short-range communication that is the same as or different from the first short-range communication, changing the received first identification information in a predetermined manner, And a security processing module that sets the first pass code of the security processing module to one or more processors.

According to various embodiments, by setting the identification information of another electronic device connected by network communication to the specified data of the electronic device or the security key of the designated system, the passcode of the security environment set in the electronic device or personal information of the user is not exposed A method and a user interface for maintaining security can be provided.

1 illustrates a network environment 100 including an electronic device 101, in accordance with various embodiments.
2 illustrates a block diagram 200 of a security processing module 170 of an electronic device (e.g., electronic device 101), according to various embodiments.
3A and 3B illustrate operations for processing the identification information received at the electronic device 101 according to various embodiments.
Figures 4A-4C illustrate operations for setting security in the electronic device 101 according to various embodiments.
5A and 5B illustrate an operation of releasing a security environment set in the electronic device 101 according to various embodiments.
6A and 6B show the flow of a security setting operation in the electronic device 101 according to various embodiments.
FIG. 7 shows a flow of operations for processing secured data in the electronic device 101 according to various embodiments.
8 shows a block diagram 800 of an electronic device 801 in accordance with various embodiments.

Hereinafter, embodiments of the present invention will be described with reference to the accompanying drawings.

The embodiments of the present invention can make various changes and have various embodiments, and specific embodiments are illustrated in the drawings and detailed description related thereto is described. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all changes and / or equivalents and alternatives falling within the spirit and scope of the invention. In the description of the drawings, like reference numerals may be used for similar elements.

In various embodiments of the present invention, the term "or" or the like includes any and all combinations of words listed together. For example, 'A or B' may comprise A, include B, or both A and B.

In various embodiments of the present invention, expressions such as 'first', 'second', 'first' or 'second' may modify various elements of the present invention, but the order and / . In addition, the representations may be used to distinguish one component from another.

In the various embodiments of the present invention, when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, It is to be understood that the components may also be present. On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between.

The terms used in various embodiments of the present invention are used to illustrate specific embodiments and are not intended to limit the invention. The singular < RTI ID = 0.0 > expression < / RTI > may include a plurality of representations unless the context clearly dictates otherwise. Also, all terms used herein, including technical or scientific terms, should be construed as having the same meaning as commonly understood by one of ordinary skill in the art to which this invention pertains, Unless explicitly defined, should not be construed as an ideal or overly formal sense.

An electronic device according to various embodiments of the present invention may be a device including a communication function. For example, the electronic device may be a smartphone, a tablet personal computer, a mobile phone, a videophone, an e-book reader, a desktop personal computer a laptop computer, a netbook computer, a personal digital assistant (PDA), a portable multimedia player (PMP), an MP3 player, a mobile medical device, a camera, or a wearable device (Eg, head-mounted-device (HMD) such as electronic glasses, electronic apparel, electronic bracelets, electronic necklaces, electronic apps or smartwatch) One can be included. Also, an electronic device according to various embodiments of the present invention may be one or more of the various devices described above. In addition, it is apparent to those skilled in the art that the electronic device according to various embodiments of the present invention is not limited to the above-described devices.

Hereinafter, an electronic device according to various embodiments will be described with reference to the accompanying drawings. The term user as used in various embodiments may refer to a person using an electronic device or a device using an electronic device (e.g., an artificial intelligence electronic device).

1 illustrates a network environment 100 including an electronic device 101, in accordance with various embodiments. 1, an electronic device 101 may include a bus 110, a processor 120, a memory 130, an input / output interface 140, a display 150, a communication interface 160, and a security processing module 170.

The bus 110 may be a circuit that interconnects the components described above and communicates communication signals (e.g., control messages) between the components described above.

Processor 120 may receive instructions from other components (e.g., memory 130, input / output interface 140, display 150, communication interface 160, or security processing module 170) And can execute an operation or data processing according to the decoded command. According to one embodiment, the processor 120 may control the security processing module 170 to connect to the second electronic device 102 via one or more communication interfaces 160 to one or more network communication environments. The processor 120 may control to receive designated data received via the input / output interface 140 or a designated identification received from the second electronic device 102, which is connected via network communication, if the data is entered to set the security environment in the specified system. The processor 120 can use the received identification information as a passcode to control the designated data or system of the electronic device 101 to set a security environment. The processor 120 may control to perform the above-described embodiment directly at the processor 120. [

Memory 130 may store instructions or data received from processor 120 or other components (e.g., input / output interface 140, display 150, communication interface 160, or security processing module 170, etc.) or generated by processor 120 or other components Can be stored. According to one embodiment, the memory 130 stores information about the security environment set in the electronic device 101, identification information received from the second electronic device 102 connected by the designated network communication, information about the designated network communication associated with the second electronic device 102, One or more of the pass codes of the security environment set by the identification information received by the second electronic device 102 may be stored. In addition, the memory 130 may include programming modules such as a kernel 131, a middleware 132, an application programming interface (API) 133, or an application 134, and each programming module may comprise software, firmware, And may be configured in a combination of two or more.

The kernel 131 may include system resources (e.g., bus 110, processor 120, or memory 130, etc.) used to execute an operation or function implemented in the other programming modules, e.g., middleware 132, API 133, Control or management. In addition, the kernel 131 may provide an interface through which the middleware 132, the API 133, or the application 134 can access and control or manage individual components of the electronic device 101.

The middleware 132 may perform an intermediary role so that the API 133 or the application 134 can communicate with the kernel 131 to exchange data. In addition, the middleware 132 may use system resources (e.g., bus 110, processor 120, or memory 130, etc.) of the electronic device 101 for at least one application of the application 134, for example in connection with work requests received from the application 134 (E.g., scheduling or load balancing) using a method such as assigning a priority to a job request.

The API 133 is an interface for the application 134 to control the functions provided in the kernel 131 or the middleware 132, and includes at least one interface or function (for example, a command or a command) for file control, window control, image processing, ).

The application 134 may be an application related to the exchange of information between the electronic device 101 and an external electronic device (e.g., electronic device 102 or electronic device 104). Applications associated with information exchange may include, for example, a notification relay application for communicating specific information to an external electronic device, or a device management application for managing an external electronic device. According to various embodiments, the application 134 may include applications that are additionally specified according to the attributes (e.g., the type of electronic device) of the external electronic device (e.g., the electronic device 102 or the electronic device 104).

The input / output interface 140 may be configured to send commands or data entered from a user via a sensor (e.g., an acceleration sensor, a gyro sensor) or an input device (e.g., a keyboard or touch screen) The communication interface 160, or the security processing module 170. For example, the input / output interface 140 may provide data to the processor 120 about the user's touch input through the touch screen. The input / output interface 140 also outputs commands or data received from the processor 120, the memory 130, the communication interface 160, or the security processing module 170 via the bus 110, for example, via an output device (e.g., a speaker or a display) . For example, the input / output interface 140 can output the voice data processed through the processor 120 to the user through the speaker.

The display 150 may display various information (e.g., multimedia data or text data) to the user. The display 150 may be configured as a touch screen for inputting commands by touching or proximity touching the input means with the display. The touch screen may include a touch panel to simultaneously perform an input function and a display function. The touch panel can include a liquid-crystal display (LCD) or an active-matrix organic light-emitting diode (AM-OLED) and is flexible, transparent or wearable . The touch panel can recognize a touch input in at least one of an electrostatic, a pressure sensitive, an infrared or an ultrasonic manner. The touch panel may further include a controller. In the case of electrostatic type, the touch panel can recognize not only direct touch but also proximity touch. The proximity touch may also be referred to as contactless touch or hovering. Such a touch panel may further include a tactile layer to provide a tactile response to the user. The touch screen may include a hologram, which can show stereoscopic images in the air using interference of light. Additionally, the touch screen may further comprise a control circuit for controlling the touch panel or hologram. The touch screen and the touch panel may be represented by the display 150, unless otherwise specified in the following description.

The communication interface 160 may connect communication between the electronic device 101 and an external device (e.g., electronic device 102, electronic device 104, or server 106). For example, the communication interface 160 may be a network communication (e.g., Internet, local area network (LAN), wire area network (WAN), telecommunication network, cellular network, satellite network or plain old telephone service (POTS) (Such as wireless fidelity, Bluetooth, near field communication (NFC), infrared data association (IrDA), ANT + interface, RS-232 (recommended standard 232), or plain old telephone service (POTS)). According to one embodiment, a protocol (e.g., a local communication protocol, a network communication protocol, or a wired communication protocol) for communication between the electronic device 101 and an external device may be supported by at least one of API 133 or middleware 132. Each of the electronic devices 102, 104 may be the same (e.g., of the same type) device as the electronic device 101 or a different (e.g., different type) device.

The security processing module 170 may receive identification information of one or more other electronic devices connected by a network communication to establish the security of the specified data or designated system of the electronic device 101. The security processing module 170 can request the corresponding electronic device for identification information corresponding to the secured data or the security key of the security setting information for accessing the designated system, and based on the received identification information, The specified data or the specified system can be accessed.

The security processing module 170 may request the second electronic device to transmit the first identification information of the second electronic device in a first short range communication and to transmit the first identification information from the second electronic device to the second electronic device 1 short-range communication, and can change the received first identification information in a predetermined manner to set the first pass code of the security attribute.

The security processing module 170 may determine the identification information by one or more of a mac address, a user ID (UID), a service set ID (SSID), and a personal identification number (PIN) code. The security processing module 170 may notify the second short-range communication method in the process of requesting transmission of the first identification information of the second electronic device. The security processing module 170 may determine that the second short range communication is wireless fidelity (wifi) communication when the first identification information of the second electronic device is the MAC address. If the first identification information of the second electronic device is the UID, the security processing module 170 may determine the second short range communication as near field communication (NFC) communication. The security processing module 170 may change the first identification information in a predetermined manner, change the position of at least a part of the first identification information, and change the method of combining the first identification information and the second identification information have. The security processing module 170 requests the second electronic device for the second identification information of the second electronic device, receives the second identification information from the second electronic device, and performs security processing based on the first identification information and the second identification information Attribute can be set to the second pass code of the attribute. The security processing module 170 changes the first identification information, the second identification information, and the first identification information in a predetermined manner to change the first pass code and the second identification information set in a predetermined manner, A second passcode may be set by performing one or more of the following ways: replace at least a portion of two or more of the codes and change the position of at least two of the codes. The security processing module 170 may receive the second identification information of the third electronic device requested by the third electronic device and set the second identification information to the second pass code of the security attribute. The security processing module 170 may connect the first short range communication to one or more of NFC communication, bluetooth communication, wifi communication, infrared data association (IrDA) communication, ANT + communication, zigbee communication. The security processing module 170 executes the content of the security attribute, requests transmission of the first identification information to the second electronic device that has transmitted the identification information used in the security setting of the content, and transmits the first identification information from the second electronic device It is possible to execute the content when the result obtained by changing the first identification information in a predetermined manner is a pass code.

2 shows a block diagram 200 of a security processing module 170 of an electronic device (e.g., electronic device 101), in accordance with various embodiments. 2, the security processing module 170 may include a detection module 210, a determination module 220, and a provision module 230

The sensing module 210 may be configured to communicate with one or more other electronic devices (e.g., a second electronic device 102 or a third electronic device 103) connected in a network communication with the electronic device 101, ), Other electronic devices that can be connected, or other electronic devices that have more than one connected history.

The determination module 220 may request one or more other electronic devices specified in the electronic device 101 to transmit identification information for security key setting of the security environment. The determination module 220 can set the identification information received from another designated electronic device as it is, or a security key of a security environment for setting the changed or processed result in the electronic device 101. The determination module 220 determines The identification information may be used as it is, or the result of the modification or processing may be determined to be unlocked in the security environment set in the electronic device 101 or match the security key for secure authentication.

The providing module 230 may include one or more other electronic devices (e.g., a second electronic device 102 or a third electronic device 103) connectable to the electronic device 101 in a network communication, other electronic devices connectable to the electronic device 101, Information on the electronic device can be displayed on the display module 150. [ The providing module 230 may display information on identification information requesting transmission to another electronic device on the display module 150 of the electronic device 101. [

3A and 3B illustrate operations for processing the identification information received at the electronic device 101 according to various embodiments.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

The electronic device 101 can establish security for one or more contents to be performed in the electronic device 101 and can request a security release according to a specified security method upon invoking secured contents. The security (or security environment) set in the designated content of the electronic device 101 may be a setting for controlling the corresponding content not to be confirmed unless the security of the corresponding content is released from the electronic device 101. The electronic device 101 may be configured in a security setting to include information about a module designated in one or more other electronic devices (e.g., second electronic device 102 and / or third electronic device) Information or unique information) may be selected to be used as a passcode, and a transmission request for information on the selected designated module may be transmitted to the corresponding electronic device. The electronic device 101 can receive the corresponding information (e.g., information on the selected module) from the electronic device that requested transmission of the information on the designated module, and set the security function on the content designated based on the information on the received module Example: Set the information about the received module to the passcode of the configured security environment). The electronic device 101 may request information on the designated module when calling the secured content, and the electronic device 101 may request the second electronic device 102 and / or the third electronic device 103 It is possible to request the transmission of information about the service. The electronic device 101 can determine whether the information about the module received at the second electronic device 102 and / or the third electronic device 103 can release security of the secured content, and if the information is releasable information, Can be called.

According to one embodiment, the electronic device 101 may set security on designated content (e.g., image data) contained in the memory 130. In calling the image data, the electronic device 101 may request the second electronic device to transmit the 'mac address' of the 'wifi module' according to the security setting information set in the image data, and the 'NFC module' The transmission of the identification information of the mobile terminal 100 can be requested. The second electronic device 102 can transmit the 'mac address information' of the 'wifi module' to the electronic device 101 according to the information set in the security setting process for the designated image data of the electronic device 101, The identification information of the 'NFC module' can be transmitted to the device 101. The electronic device 101 receives the 'mac address information' of the 'wifi module' in the second electronic device 102 connected by the network communication and receives security information (for example, The wifi security 303 of the second electronic device 102) and the identification information of the 'NFC module' received from the second electronic device 103 connected by the network communication and receiving the identification information of the 'NFC module' (For example, the NFC security 305 of the third electronic device 103) set in the image data with the second security release process. The electronic device 101 can call the designated image data by performing a security release process corresponding to the designated 'wifi security 303 of the second electronic device 102' and the 'NFC security 305 of the third electronic device 103'.

The electronic device 101 may be a security key that can use the specified information of one or more other electronic devices that can be connected by network communication, A password, a pass code, or an authentication key), and may be set based on identification information of another electronic device transmitted from another designated electronic device or identification information of one or more modules included in another electronic device The security of the content can be released.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

The electronic device 101 may include one or more of the content provided by the electronic device 101 or designated identification information of another designated electronic device (e.g., the second electronic device 102) You can choose to set the identity of the included embedded module to the password of the security environment. The electronic device 101 may request the second electronic device to transmit the selected identification and the electronic device 101 may set the passcode of the secure environment to receive and set the identification information. In setting the received identification information to the passcode of the security environment, the electronic device 101 can use the received identification information as it is or change the received identification information to a designated method.

In the method of changing the received identification information, the electronic device 101 can substitute the identification information into the specified formula or algorithm, replace at least a part of the identification information with other specified information, The identification information and other specified identification information may be combined, or two or more of the above-described methods may be used in combination. Various embodiments for changing the identification information received by the electronic device 101 will be described below.

According to one embodiment, the electronic device 101 sends a request to the second electronic device 102 designated as the first security device for the mac address information of the second electronic device 102 from the second electronic device 102 to the 83-12-TZ-49-21- 14 (311) as mac address information. The electronic device 101 can directly set the received mac address information, 83-12-TZ-49-21-14 (311), as the passcode of the secure environment.

According to one embodiment, the electronic device 101 can change the received mac address information, 83-12-TZ-49-21-14 (311), to change the data in the format specified in the electronic device 101. For example, the electronic device 101 can change the data in the format specified in the electronic device 101, such as the received mac address information, 83-12-TZ-49-21-14 (311) 8312TZ492114, or one or more additional information (Eg Mac), including Mac8312TZ492114 (313), and can be set to a passcode in a secure environment.

According to one embodiment, the electronic device 101 may combine two or more identification information to generate a new type of identification information. For example, the electronic device 101 changes the SSID information received from the Mac 8312TZ492114 (313), which changed the mac address information received from the second electronic device 102 designated as the first security device, and the third electronic device 102 designated as the second security device SSIDB831J230H (317) can be combined and changed into a new type of data such as MSaScI8D3B1823T1ZJ4293201H14 (319), and can be set as a passcode of a secure environment. The electronic device 101 may set only the specified partial information of the combined MSaScI8D3B1823T1ZJ4293201H14 (319) to a passcode.

The embodiment for changing the above-mentioned identification information is for the purpose of explaining that the identification information selected by the electronic apparatus 101 can be changed and set as the pass code of the specified security environment. The present invention is not limited to the above-described method of changing the identification information, The acquired identification information can be changed. For example, in the method of changing the acquired identification information, the electronic device 101 can use a conventional encryption method such as DES (data encryption standard), caesar, monoalphabetic, vigenere, IDEA (International Data Encryption Algorithm) May be modified by applying one or more of the following.

Figures 4A-4C illustrate operations for setting security in the electronic device 101 according to various embodiments.

The electronic device 101 may include one or more identification information of a module included in one or more other electronic devices (e.g., the second electronic device 103 and / or the third electronic device 103) The security environment can be set to be used as a security key for setting the security of the designated content of the electronic device 101. [

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

The electronic device 101 may include one or more other electronic devices that are connected by a network communication or are connectable by network communication, for example, to determine the identity of another electronic device to be used as a security key when setting up a secure environment for one or more content, The second electronic device 103 and / or the third electronic device 103) and information about one or more modules that may provide identification information for each other electronic device on the display module 150 of the electronic device 101 . According to one embodiment, when the security environment is set for the designated content, the electronic device 101 transmits a message 'requesting the display module to select a module to be set as a security key (specifically, identification information of the module) Select device 401 'and display information 403 on one or more modules that provide identification information that can be set with a secret key on display module 150. For example, information on the module displayed on the display module 150 of the electronic device 101 includes information '102_001 connected: wifi 405' for the 'wifi module' of the second electronic device 102 connected by wifi communication with the electronic device 101, Information on 'NFC module' of the second electronic device connectable by communication '102_002 connectable: NFC 407' and information on the 'wifi module' of the third electronic device 103 connectable with the electronic device 101 by wifi communication; Connectable: can be wifi 409 '. The electronic device 101 can select module information (for example, the module information 405, the module information 407, or the module information 409) to be used as the security key of the content specified in the information 403 for the module displayed on the display module 150. The electronic device 101 can terminate the security environment setting of the designated content when 'cancel 411' is selected.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

When the designated module information to be used as a security key is selected in the security environment setting of the content specified in the list displayed on the display module 150, the electronic device 101 may request transmission of module information (e.g., identification information) designated to the corresponding electronic device. According to one embodiment, the electronic device 101 is configured to display the module information (e.g., information 405 on the 'wifi module' of the second electronic device 102) selected in the list (e.g., 403 in FIG. 4A) mac address' transmission request data to the second electronic device 102. The electronic device 101 can display 'requesting transmission of a wifi mac address to the device 102' for the 'mac address' transmission request to be used as a security key for security setting 421'. The second electronic device 102 determines whether to transmit the 'mac address' of the 'wifi module' to the electronic device 101 with respect to the 'mac address' transmission request data of the 'wifi module' of the second electronic device received by the electronic device 101 Can mode; An 'Accept 427' icon and a 'Reject 429' icon may be displayed on the display module 450 of the second electronic device 102, and 'Accept 427 'Icon is selected, the electronic device 101 may receive a' mac address' for the 'wifi module' of the second electronic device 102 from the second electronic device. The electronic device 101 sends the 'mac address' request data for the 'wifi module' of the second electronic device 102 to the second electronic device 102 and the corresponding 'mac address' from the second electronic device 102 The device 101 and the second electronic device can be communicated via wifi communication or designated communication to which they are connected. The electronic device 101 may terminate the security environment setting of the designated content when the 'cancel 423' icon is selected before completing receiving the 'mac address' of the 'wifi module' of the second electronic device 102 from the second electronic device.

According to one embodiment, the electronic device 101 identifies the selected module information (e.g., information 407 on the 'NFC module' of the second electronic device 102) in a list (e.g., 403 in FIG. And transmit the information transmission request data to the second electronic device. If the second electronic device 102 determines to transmit the identification information of the 'NFC module' of the second electronic device 102 to the electronic device 101, the second electronic device 102 transmits the identification information of the 'NFC module' of the second electronic device 102 to the electronic device 101 Can be transmitted. The method of transmitting and receiving data by NFC communication in the electronic device 101 and the second electronic device 102 is similar to that in the NFC communication mode of the electronic device 101 and the second electronic device 102 in that the distance between the electronic device 101 and the second electronic device It may be a method of transmitting / receiving designated data.

According to one embodiment, the electronic device 101 is configured to display the module information (e.g., information 409 on the 'wifi module' of the third electronic device 103) selected in the list (e.g., 403 in FIG. 4A) mac address' transmission request data to the third electronic device 103. It can be confirmed that the electronic device 101 is not connected to the third electronic device 103 including the selected 'wifi module' by wifi communication and can request a wifi communication connection to the third electronic device 103 by referring to the setting information of the electronic device 101 have. The electronic device 101 may request the third electronic device 103 to send a 'mac address' to the 'wifi module' of the third electronic device 103 when wifi communication is established with the third electronic device 103. Or the electronic device 101 may request a 'mac address' transmission for the 'wifi module' of the third electronic device 103 at the time of requesting the third electronic device 103 for a wifi communication mirror. The electronic device 101 may receive a 'mac address' for the 'wifi module' of the third electronic device 103 in the designated communication associated with the third electronic device 103. The electronic device 101 may terminate the security environment setting of the designated content when the 'cancel 423' icon is selected before completing receiving the 'mac address' of the 'wifi module' of the second electronic device 102 from the second electronic device.

The electronic device 101 can set the security environment of the designated content through one or more module information (e.g., identification information) included in the acquired electronic device. The electronic device 101 can process, change, or encrypt the received identification information. The electronic device 101 can determine the processed key, the changed key, and the encrypted identification information as a stored key that can release the established security environment when calling the specified content.

In various embodiments described above, the electronic device 101 may include an electronic device (e.g., a second electronic device 102 and a third electronic device 103) and / or an electronic device (e.g., a second electronic device 102 And the third electronic device 103) to request the transmission of the identification information of the corresponding module to the selected second electronic device 102 or the third electronic device 103. However, the present invention is not limited to the embodiment selected by the display module 150 And may be set in the security configuration information of the electronic device 101 to request transmission of the identification information of the second electronic device 102 connected to the electronic device 101 and / or the designated module of the third electronic device 103. The electronic device 101 may also request to transmit the identification information of the second electronic device 102 or the third electronic device 103 as well as the identification information of the module included in the second electronic device 102 or the third electronic device 103, The security key of the security environment set based on the identification information of the electronic device 102 or the identification information of the third electronic device 103 may be set.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

In setting the security environment of the designated content, the electronic device 101 may transmit one or more pieces of module information (for example, identification information of the corresponding module) included in one or more other electronic devices connected by network communication or connectable by network communication Can set more than one security environment for more than one security-specified content.

According to an exemplary embodiment, the electronic device 101 may perform a first security process for releasing a first security environment set for content designated based on a 'wifi mac address' of the second electronic device 102 in an operation of setting a security environment for the designated content In the state where the key is set, one or more security environments may be provided for further setting. The electronic device 101 transmits the content designated on the basis of the identification information of the module information 433 displayed on the display module 150 to the 'NFC module' of the second electronic device 102 or the 'wifi module' of the third electronic device 103, A second security key capable of releasing the environment can be set. The electronic device 101 can set a plurality of security environments for the content specified based on the identification information of a designated module included in one or more other electronic devices connectable via network communication as described above.

5A and 5B illustrate an operation of releasing a security environment set in the electronic device 101 according to various embodiments.

The electronic device 101 can request the transmission of the identification information of the module corresponding to the sperm device (for example, the second electronic device 102) specified in the security setting information when calling the secured system or data, Can be released.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

When the electronic device 101 calls contents for which the security environment is set, the electronic device 101 can determine whether or not an electronic device (for example, a second electronic device) transmitting the security key set in the secure environment of the designated content is connected to the network communication have. The electronic device 101 may request transmission of identification information for a designated module of the second electronic device 102 designated in the security configuration information of the designated content when the second electronic device 102 is connected by a network communication, Upon receipt of the identification information of the module, the security of the designated content set in the security environment can be released. According to one embodiment, when the electronic device 101 has selected to secure the specified content (e.g., image data), the security key set in the security environment setting information of the image data (e.g., 'mac address' ) Is connected to the " wifi communication ". When the electronic device 101 confirms that the second electronic device 101 is connected by 'wifi communication', it may request the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 may terminate the 'mac address' transmission request and reception operation of the second electronic device 102 by selecting the 'cancel 503' icon before receiving the requested 'mac address' to the second electronic device 102.

According to one embodiment, when the electronic device 101 has selected to secure the specified content (e.g., image data), the security key set in the security environment setting information of the image data (e.g., 'mac address' ) Is connected to the second electronic device 102 via network communication. When the electronic device 101 confirms that the second electronic device 101 is connected by network communication, it can request the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 receives the 'wifi mac address' of the second electronic device 102 from the second electronic device 102 to release the security setting of the designated image data, and in the 'wifi communication' of the second electronic device 102 Wifi mac address' transmitted from the 'wifi module' of the device 102), the security setting of the designated image data can be released. Electronic device 101 or wpo 2 electronic device 102 may request a " wifi communication " connection to a partner electronic device if it is confirmed that a 'wifi communication' is not connected between electronic device 101 and second electronic device 102. The electronic device 101 may receive a 'wifi mac address' of the second electronic device 102 at the second electronic device 102 in a 'wifi communication'. The electronic device 101 may terminate the 'mac address' transmission request and reception operation of the second electronic device 102 by selecting the 'cancel 503' icon before receiving the requested 'mac address' to the second electronic device 102.

According to one embodiment, when electronic device 101 requests second electronic device 102 to transmit identification information (e.g., 'mac address') for a designated communication module (e.g., a 'wifi module') of second electronic device 102 , The second electronic device 102 may display a message 'request for transmission of wifi address for unsecure from first electronic device 505' corresponding to display module 250. The second electronic device 102 may transmit the 'wifi mac address' of the second electronic device 102 to the electronic device 102 when the 'transmit 507' icon is selected, and the first electronic device 101 Wifi mac address' of the second electronic device 102 that requested transmission.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

The electronic device 101 receives the identification information about one or more of the various modules included in the second electronic device 102 and sets the security environment so as to set the specified data of the electronic device 101 or the security system of the specified system as security . In setting the security key, the electronic device 101 may request transmission of the secured identification information in the second electronic device 102. [ According to one embodiment, in setting the security key of the designated security environment, the electronic device 101 may determine that the identification information of the second electronic device 102 requesting transmission to the designated second electronic device is an identification of the network communication module such as 'wifi module' It is not limited to information but may be requested to transmit various identification information such as a subscriber identity module (SIM), identification information stored in a universal subscriber identity module (USIM), user identification information, and SSID (service set identifier) . The second electronic device 102 may be configured to access various identification information, such as a subscriber identity module (SIM), identification information stored in a universal subscriber identity module (USIM), user identification information, service set identifier (SSID) One or more security environments can be configured to enter security keys. For example, if the second electronic device 102 is requested to transmit identification information (e.g., PIN (personal identification number (PIN) code 515) stored in the SIM from the first electronic device, the second electronic device 102 accesses the identification information stored in the SIM And may transmit the identification information stored in the SIM of the second electronic device 102 to the first electronic device 101 when it is determined that the correct security key has been input. The electronic device 101 completes a security key entry that allows access to the identification information stored in the SIM during the provision 517 or at the second electronic device 102 to enter a security key that allows access to the identification information stored in the SIM at the second electronic device 102 When 'cancel 519' is selected before, the operation of transmitting the identification information stored in the SIM of the second electronic device 102 to the electronic device 101 may be terminated.

6A and 6B show the flow of a security setting operation in the electronic device 101 according to various embodiments.

The electronic device 101 may request to send the specified identification information to a designated electronic device (e.g., the second electronic device 102 and / or the third electronic device 103) that can connect to the network communication when setting up a secure environment for the specified content or system have. The electronic device 101 can receive the requested identification information, and can set the security environment set as a security key used for releasing or security authentication.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

At operation 601, the electronic device 101 may request transmission of the identified identification information to the second electronic device 102. According to one embodiment, in requesting identification information of a designated second electronic device 102, the electronic device 101 may determine whether it is in a network communication with the second electronic device 102. For example, when the electronic device 101 requests the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102, it determines whether the second electronic device 102 is connected to the second electronic device 102 by 'wifi communication' . The electronic device 101 may request transmission of the 'mac address' of the 'wifi module' of the second electronic device 102 in a different communication manner if the electronic device 101 is not in a 'wifi communication' state with the second electronic device 102. The electronic device 101 may request the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102 in 'bluetooth communication' to 'wifi communication'.

At operation 603, the electronic device 101 may receive the identification information of the second electronic device 102 requested from the second electronic device 102. According to one embodiment, the electronic device 101 may receive the 'mac address' of the 'wifi module' of the second electronic device that requested the second electronic device 102. For example, the second electronic device 102 may determine whether it is in wifi communication with the first electronic device 101 in response to a 'mac address' transmission request of a second electronic device 'wifi module' received from the first electronic device 101 have. If the electronic device 101 and the second electronic device 102 are not in a "wifi communication" state, the first electronic device 101 or the second electronic device 102 may perform a "wifi communication" connection request to the partner electronic device. The electronic device 101 may receive the 'wifi mac address' of the second electronic device 102 from the second electronic device 102 upon confirming that it is connected by 'wifi communication' with the second electronic device 102.

In operation 605, the electronic device 101 may set the received identification information as a security key for releasing the security of the specified security environment or a security key for security authentication. According to one embodiment, the electronic device 101 may set the 'wifi mac address' of the received second electronic device 102 to a passcode that can access the secured data of the electronic device 101. Alternatively, the electronic device 101 may encrypt, process or change the 'wifi mac address' of the received second electronic device 102 in a designated manner and set it as a security key. The electronic device 101 may receive the identification information of the specified security key from the designated electronic device 101 to access the secured data after the security setting process, and may then unsecure the corresponding security environment or perform the security authentication procedure.

The electronic device 101 may terminate the embodiment of FIG. 6A by performing an operation 605.

According to various embodiments, there is provided a method of operating a first electronic device, the method comprising: requesting a second electronic device to transmit identification information of the second electronic device; receiving the identification information from the second electronic device; , And setting the received identification information as a passcode.

According to various embodiments, the passcode may be set in the data or system specified in the first electronic device. According to various embodiments, the step of setting the identification information as a pass code may further include setting a result of performing at least one of changing, processing and encrypting the received identification information to a pass code . According to various embodiments, the identification information may be determined by one or more of a mac address of a wifi module, a UID, an SSID, and a PIN code of an NFC module. According to various embodiments, the identification information may be received by wifi communication when the identification information is a MAC address, and may be received by NFC communication when the identification information is a UID. According to various embodiments, there is provided a method comprising: requesting a second electronic device for a second identification of the second electronic device; receiving the second identification information from the second electronic device; And setting the information to the second pass code. According to various embodiments, there is provided a method comprising: requesting a second electronic device for a second identification of the third electronic device; receiving the second identification information from the second electronic device; And setting the information to the second pass code. According to various embodiments, the first electronic device and the second electronic device may be connected in one or more of NFC communication, bluetooth communication, wifi communication, IrDA communication, ANT + communication, zigbee communication. According to various embodiments, the identification information may be received when a second pass code according to a security setting specified in the second electronic device is input in the second electronic device.

Hereinafter, various embodiments of the present invention will be described with reference to FIG. 6B.

The electronic device 101 may request to send the specified identification information to a designated electronic device (e.g., the second electronic device 102 and / or the third electronic device 103) that can connect to the network communication when setting up a secure environment for the specified content or system have. The electronic device 101 can receive the requested identification information, and can set the security environment set as a security key used for releasing or security authentication.

Hereinafter, various embodiments of the present invention will be described with reference to FIG.

At operation 611, the electronic device 101 may perform operations to select a content or system to set a secure environment. The content or system that sets the security environment in the electronic device 101 may be used in the electronic device 101, such as one or more programs, image data, sound data, information storage data, It can be various data.

At operation 613, the electronic device 101 may display another electronic device (e.g., the second electronic device 102 or the third electronic device 103), which is connectable by network communication or having a history of connecting to the network communication more than once. According to one embodiment, the electronic device 101 may include other electronic devices, such as other electronic devices connectable at the electronic device 101, or other electronic devices connected at the electronic device 101 via one or more network communication modules (e.g., a "wifi module" Information on another electronic device having a connection history at least once can be displayed on the display module 150. [ Or identification information (e.g. PIN information of the SIM card) of the module included in the second electronic device 102 promised to the electronic device 101 or another designated electronic device (e.g., the second electronic device 102) can be displayed on the display module 150 have.

At operation 615, the electronic device 101 may select a designated module of the second electronic device 102 or the second electronic device 102 to set the security environment as a security key for unlocking or security authentication. The electronic device 101 may request the second electronic device 102 to transmit the identification information of the selected second electronic device 102 or the identification information of the designated module of the second electronic device 102. [

At operation 617, the electronic device 101 may receive the requested identification information from the second electronic device 102. When receiving the identification information requested by the second electronic device 102, the electronic device 101 transmits the identification information of the communication module of the second electronic device 102 to the electronic device 102 through the corresponding designated communication, 101 in accordance with the present invention. According to one embodiment, when requesting the 'mac address' transmission of the 'wifi module' of the second electronic device 102 from the electronic device 101 to the second electronic device 102, the electronic device 101 transmits a 'wifi communication' Wifi mac address' of the second electronic device 102, which is received by the electronic device 101, as a security key of the security environment set by the electronic device 101.

In operation 619, the electronic device 101 may set a security environment based on the identification information received by the second electronic device, and may generate a security key for releasing the security environment in which the received identification information is set, It can be set as a security key. According to one embodiment, the electronic device 101 can use the received identification information as it is, or set the security key using the result of at least one of change, processing, and encryption.

The electronic device 101 may terminate the embodiment of FIG. 6B by performing an operation 619. FIG.

FIG. 7 shows a flow of operations for processing secured data in the electronic device 101 according to various embodiments.

In order for the electronic device 101 to access secured data, the electronic device 101 may request transmission of the identification information of another electronic device specified in the security setting information. The electronic device 101 can receive the identification information of the received designated electronic device and compare it with the secured security key, and when it is matched, can release the specified security or complete the security authentication.

At operation 701, the electronic device 101 accesses the designated data of the secured electronic device 101 or the designated system of the electronic device 101 based on the first module information of the second electronic device (e.g., the 'mac address' of the 'wifi module' Lt; / RTI > The electronic device 101 may display information on a secured state and / or information on a state requiring a security key input on the display module 150 when the designated data or the designated system is called.

In operation 703, the electronic device 101 may request security device identification information transmitted to another electronic device set corresponding to the security key by referring to security-related data or security-setting information of the security-enhanced system. According to one embodiment, the electronic device 101 can confirm the specified data in the security setting information of the data that is specified as being secured to the 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 may request the second electronic device 102 to transmit a 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 can determine whether the second electronic device 102 receiving the security key according to the security setting information of the designated content is connected to the network communication. The electronic device 101 may request the second electronic device 102 to transmit identification information of the security key set in the security environment of the first electronic device when the second electronic device 102 is connected by a network communication. The electronic device 101 may request a network communication connection to the second electronic device 102 if it determines that the second electronic device 102 is not connected by a network communication. According to one embodiment, the electronic device 101 may determine that the security key is set based on the 'mac address' of the 'wifi module' of the second electronic device 102 in the security configuration information, wifi communication ". The electronic device 101 may request a 'wifi communication' connection to the second electronic device 102 upon confirming that the electronic device 101 is not connected to the second electronic device 102 by 'wifi communication'.

In operation 705, the electronic device 101 can compare with the security key set in the security environment designated by the received identification information, and when it is matched, release the specified security or authenticate the specified security to access the specified data or the designated system. According to one embodiment, the electronic device 101 receives identification information (e.g., 'mac address' of the 'wifi module' of the second electronic device) received at the second electronic device 102, Depending on the security key, it can be changed, processed or encrypted. If it matches the set security key, the security environment can be released or the designated data or the designated system can be accessed.

The electronic device 101 terminates the embodiment of FIG. 7 by performing an operation 705.

Based on various embodiments of the present invention described above, the first electronic device 101 may request the second electronic device 102 to transmit the first identification information of the second electronic device 102 in a first short distance communication, Receiving first identification information from the electronic device 102 in a second short-range communication that is the same as or different from the first short-range communication; changing the received first identification information in a predetermined manner to generate a first- .

Various embodiments that illustrate the present invention may be performed by one or more programs, one or more processors (e.g., processor 120), and security processing module 170 that the memory of electronic device 101 includes. Each of the above-described components of the electronic device according to various embodiments of the present invention may be composed of one or more components, and the name of the component may be changed according to the type of the electronic device. The electronic device according to various embodiments of the present invention may be configured to include at least one of the above-described components, and some components may be omitted or further include other additional components. In addition, some of the components of the electronic device according to various embodiments of the present invention may be combined into one entity, so that the functions of the components before being combined can be performed in the same manner.

According to various embodiments, at least a portion of an apparatus, method, and / or method in accordance with the various embodiments described in the claims of the present invention and / or the specification may be implemented in a form including hardware, software, firmware or a combination of two or more of hardware, (E.g., a module, a unit). A module may be a minimum unit or a portion thereof that performs various embodiments of the present invention as a minimum unit or a part of an integrally constructed component. The module may be implemented mechanically or electronically. When implemented in software, a computer-readable storage medium (or computer-readable storage medium) for storing one or more programs (or programming modules) may be provided. For example, the software may be embodied in instructions stored on a computer-readable storage medium in the form of a programming module. The one or more programs may include instructions that cause the electronic device to perform the methods according to the embodiments of the invention and / or the claims of the present invention. The instructions, when executed by one or more processors (e.g., the processor 120), may cause the one or more processors to perform functions corresponding to the instructions. The computer readable storage medium may be, for example, the memory 130. At least some of the programming modules may be implemented (e.g., executed) by, for example, the processor 120. At least some of the programming modules may include, for example, modules, programs, routines, sets of instructions or processes, etc. to perform one or more functions.

The computer-readable recording medium includes a magnetic medium such as a hard disk, a floppy disk and a magnetic tape, an optical recording medium such as a CD-ROM (Compact Disc Read Only Memory), a DVD (Digital Versatile Disc) A magneto-optical medium such as a floppy disk and a program command such as a ROM (Read Only Memory), a RAM (Random Access Memory), a flash memory, (EEPROM), a magnetic disc storage device or other type of optical storage device, a magnetic storage device such as a magneto- A magnetic cassette may be included. Or a combination of some or all of these. In addition, a plurality of constituent memories may be included.

In addition, electronic devices may be connected to a communication network, such as the Internet, an Intranet, a LAN (Local Area Network), a WLAN (Wide Area Network), or a communication network such as a SAN (Storage Area Network) And can be stored in an attachable storage device that can be accessed. Such a storage device may be connected to the electronic device through an external port. Further, a separate storage device on the communication network may be connected to the portable electronic device. The hardware devices described above may be configured to operate as one or more software modules to perform operations on the various embodiments of the present invention, and vice versa.

Modules or programming modules according to various embodiments of the present invention may include at least one or more of the elements described above, some of which may be omitted, or may further include other additional elements. Operations performed by modules, programming modules, or other components in accordance with various embodiments of the invention may be performed in a sequential, parallel, iterative, or heuristic manner. Also, some operations may be performed in a different order, omitted, or other operations may be added.

The embodiments of the present invention disclosed in the present specification and drawings are merely illustrative examples of the present invention and are not intended to limit the scope of the present invention in order to facilitate understanding of the present invention. Accordingly, the scope of the present invention should be construed as being included in the scope of the present invention without departing from the scope and spirit of the invention as disclosed in the accompanying claims.

101: Electronic device 150: Display module
170: security processing module 102: second electronic device
103: Third electronic device

Claims (22)

A method of operating a first electronic device,
Requesting a second electronic device to transmit the first identification information of the second electronic device via a first short range communication;
Receiving the first identification information from the second electronic device in a second short distance communication; and the first short distance communication and the second short distance communication are the same or different; And
Changing the received first identification information in a predetermined manner and setting the first identification information to a first pass code of a security attribute.
The information processing apparatus according to claim 1,
MAC address, user ID (UID), service set ID (SSID), and personal identification number (PIN) code.
The method according to claim 1,
And notifying the second short-range communication method of requesting transmission of the first identification information of the second electronic device.
The method of claim 3,
Wherein the second short-range communication is determined to be wireless fidelity (wifi) communication if the first identification information of the second electronic device is a mac address.
The method of claim 3,
And if the first identification information of the second electronic device is a UID, the second short-range communication is determined as near field communication (NFC) communication.
2. The method of claim 1,
And changing the position of the specified part of the first identification information.
The method according to claim 1,
Requesting the second electronic device for second identification information of the second electronic device;
Receiving the second identification information from the second electronic device; And
Setting a second passcode of the security attribute based on the first identification information and the second identification information.
The method of claim 7, wherein the step of setting the second passcode comprises:
The first identification information, the second identification information, and the first identification information are changed in a predetermined manner to change the first pass code and the second identification information set in a predetermined manner, Replacing at least a portion of at least two of the codes, changing at least a portion of the at least two portions, and merging the two or more portions.
The method according to claim 1,
The process of receiving the second identification information of the third electronic device requested by the third electronic device and setting the second identification information to the second pass code of the security attribute may be performed before, Methods of inclusion.
2. The method of claim 1, wherein the first short-
NFC communication, bluetooth communication, wifi communication, infrared data association (IrDA) communication, ANT + communication, zigbee communication.
The method according to claim 1,
Executing contents of the security attribute;
Requesting transmission of the first identification information to a second electronic device that has transmitted the identification information used in the security setting of the content;
Receiving the first identification information from the second electronic device in the second communication; And
And executing the content when the result of changing the first identification information received in the predetermined manner is the passcode.
In a first electronic device,
A memory for storing the received one or more pieces of identification information;
Requesting transmission of first identification information of the second electronic device to a second electronic device via a first short range communication and transmitting the first identification information from the second electronic device to the second electronic device, A security processing module that receives the first identification information by another second short distance communication, and changes the received first identification information in a predetermined manner and sets the first identification information as a first pass code of a security attribute; And
And one or more processors controlling the security processing module.
13. The security processing module according to claim 12,
a module for determining the identification information by one or more of a MAC address, a user ID (UID), a service set ID (SSID), and a personal identification number (PIN) code.
13. The security processing module according to claim 12,
A module for notifying the second short-range communication method of requesting transmission of the first identification information of the second electronic device.
15. The security processing module according to claim 14,
And the second short-range communication is determined to be wireless fidelity (wifi) communication when the first identification information of the second electronic device is a MAC address.
15. The security processing module according to claim 14,
Wherein when the first identification information of the second electronic device is UID, the second short range communication is a module for determining near field communication (NFC)
13. The security processing module according to claim 12,
The first identification information is replaced in a predetermined manner, and the position of at least a part of the first identification information is changed.
13. The security processing module according to claim 12,
Requesting the second electronic device for the second identification information of the second electronic device, receiving the second identification information from the second electronic device, and transmitting, based on the first identification information and the second identification information, A module that sets the second passcode of the security attribute.
The security processing module according to claim 18,
The first identification information, the second identification information, and the first identification information are changed in a predetermined manner to change the first pass code and the second identification information set in a predetermined manner, Wherein the second passcode is set by performing one or more of a method of replacing at least a portion of two or more of the codes, and changing a position of at least a portion of the at least two portions and merging the two or more portions.
13. The security processing module according to claim 12,
Receiving the second identification information of the third electronic device requested by the third electronic device and setting the second identification information to the second pass code of the security attribute.
13. The security processing module according to claim 12,
Module for connecting said first short range communication to one or more of NFC communication, bluetooth communication, wifi communication, infrared data association (IrDA) communication, ANT + communication, zigbee communication.
13. The security processing module according to claim 12,
Requesting transmission of the first identification information to a second electronic device that has executed the content of the security attribute and transmitted the identification information used in the security setting of the content and transmits the first identification information from the second electronic device And the content is executed when the result obtained by changing the received first identification information in the predetermined manner is the pass code.
KR1020130164493A 2013-12-26 2013-12-26 Method for processing security and an electronic device thereof KR20150075987A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020130164493A KR20150075987A (en) 2013-12-26 2013-12-26 Method for processing security and an electronic device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020130164493A KR20150075987A (en) 2013-12-26 2013-12-26 Method for processing security and an electronic device thereof

Publications (1)

Publication Number Publication Date
KR20150075987A true KR20150075987A (en) 2015-07-06

Family

ID=53789013

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020130164493A KR20150075987A (en) 2013-12-26 2013-12-26 Method for processing security and an electronic device thereof

Country Status (1)

Country Link
KR (1) KR20150075987A (en)

Similar Documents

Publication Publication Date Title
US9860738B2 (en) Method for processing multiple pieces of SIM information and electronic device thereof
KR102318877B1 (en) Apparatus and method for displaying user interface
ES2945065T3 (en) Method to quickly open an application or function of the application and terminal
EP2809046B1 (en) Associating distinct security modes with distinct wireless authenticators
EP3225008B1 (en) User-authentication-based approval of a first device via communication with a second device
US10028139B2 (en) Leveraging mobile devices to enforce restricted area security
US20150324605A1 (en) Method and apparatus for sharing content between electronic devices
US10891599B2 (en) Use of state objects in near field communication (NFC) transactions
JP2016540321A (en) Make sure to allow access to remote resources
US9756173B2 (en) Leveraging mobile devices to enforce restricted area security
KR102544488B1 (en) Electronic apparatus and method for performing authentication
KR20150121559A (en) Method for controlling a sleep mode and an electronic device thereof
US20190163931A1 (en) Devices, systems, and methods for securely storing and managing sensitive information
US20150326390A1 (en) Method of managing keys and electronic device adapted to the same
KR102480627B1 (en) Electronic device for managing embedded subscriber identity module and method for the same
US20140359712A1 (en) Electronic apparatus and control method
KR20150104697A (en) Method and apparatus for grouping of personal electronic device using qr code and system therefor
JP2012203759A (en) Terminal authentication system and terminal authentication method
JP2009163282A (en) Information processor, access control method and access control program
US10133459B2 (en) Usability using BCC enabled devices
KR20150075987A (en) Method for processing security and an electronic device thereof
US20220216987A1 (en) Device and method for managing shared digital key
JP5770329B2 (en) Terminal authentication system, terminal authentication method, server, and program
US20230041559A1 (en) Apparatus and methods for multifactor authentication
KR20190044815A (en) System for manageing security license for controlling security service and method for operating thereof

Legal Events

Date Code Title Description
WITN Withdrawal due to no request for examination