Hereinafter, embodiments of the present invention will be described with reference to the accompanying drawings.
The embodiments of the present invention can make various changes and have various embodiments, and specific embodiments are illustrated in the drawings and detailed description related thereto is described. It is to be understood, however, that the invention is not to be limited to the specific embodiments, but includes all changes and / or equivalents and alternatives falling within the spirit and scope of the invention. In the description of the drawings, like reference numerals may be used for similar elements.
In various embodiments of the present invention, the term "or" or the like includes any and all combinations of words listed together. For example, 'A or B' may comprise A, include B, or both A and B.
In various embodiments of the present invention, expressions such as 'first', 'second', 'first' or 'second' may modify various elements of the present invention, but the order and / . In addition, the representations may be used to distinguish one component from another.
In the various embodiments of the present invention, when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, It is to be understood that the components may also be present. On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between.
The terms used in various embodiments of the present invention are used to illustrate specific embodiments and are not intended to limit the invention. The singular < RTI ID = 0.0 > expression < / RTI > may include a plurality of representations unless the context clearly dictates otherwise. Also, all terms used herein, including technical or scientific terms, should be construed as having the same meaning as commonly understood by one of ordinary skill in the art to which this invention pertains, Unless explicitly defined, should not be construed as an ideal or overly formal sense.
An electronic device according to various embodiments of the present invention may be a device including a communication function. For example, the electronic device may be a smartphone, a tablet personal computer, a mobile phone, a videophone, an e-book reader, a desktop personal computer a laptop computer, a netbook computer, a personal digital assistant (PDA), a portable multimedia player (PMP), an MP3 player, a mobile medical device, a camera, or a wearable device (Eg, head-mounted-device (HMD) such as electronic glasses, electronic apparel, electronic bracelets, electronic necklaces, electronic apps or smartwatch) One can be included. Also, an electronic device according to various embodiments of the present invention may be one or more of the various devices described above. In addition, it is apparent to those skilled in the art that the electronic device according to various embodiments of the present invention is not limited to the above-described devices.
Hereinafter, an electronic device according to various embodiments will be described with reference to the accompanying drawings. The term user as used in various embodiments may refer to a person using an electronic device or a device using an electronic device (e.g., an artificial intelligence electronic device).
1 illustrates a network environment 100 including an electronic device 101, in accordance with various embodiments. 1, an electronic device 101 may include a bus 110, a processor 120, a memory 130, an input / output interface 140, a display 150, a communication interface 160, and a security processing module 170.
The bus 110 may be a circuit that interconnects the components described above and communicates communication signals (e.g., control messages) between the components described above.
Processor 120 may receive instructions from other components (e.g., memory 130, input / output interface 140, display 150, communication interface 160, or security processing module 170) And can execute an operation or data processing according to the decoded command. According to one embodiment, the processor 120 may control the security processing module 170 to connect to the second electronic device 102 via one or more communication interfaces 160 to one or more network communication environments. The processor 120 may control to receive designated data received via the input / output interface 140 or a designated identification received from the second electronic device 102, which is connected via network communication, if the data is entered to set the security environment in the specified system. The processor 120 can use the received identification information as a passcode to control the designated data or system of the electronic device 101 to set a security environment. The processor 120 may control to perform the above-described embodiment directly at the processor 120. [
Memory 130 may store instructions or data received from processor 120 or other components (e.g., input / output interface 140, display 150, communication interface 160, or security processing module 170, etc.) or generated by processor 120 or other components Can be stored. According to one embodiment, the memory 130 stores information about the security environment set in the electronic device 101, identification information received from the second electronic device 102 connected by the designated network communication, information about the designated network communication associated with the second electronic device 102, One or more of the pass codes of the security environment set by the identification information received by the second electronic device 102 may be stored. In addition, the memory 130 may include programming modules such as a kernel 131, a middleware 132, an application programming interface (API) 133, or an application 134, and each programming module may comprise software, firmware, And may be configured in a combination of two or more.
The kernel 131 may include system resources (e.g., bus 110, processor 120, or memory 130, etc.) used to execute an operation or function implemented in the other programming modules, e.g., middleware 132, API 133, Control or management. In addition, the kernel 131 may provide an interface through which the middleware 132, the API 133, or the application 134 can access and control or manage individual components of the electronic device 101.
The middleware 132 may perform an intermediary role so that the API 133 or the application 134 can communicate with the kernel 131 to exchange data. In addition, the middleware 132 may use system resources (e.g., bus 110, processor 120, or memory 130, etc.) of the electronic device 101 for at least one application of the application 134, for example in connection with work requests received from the application 134 (E.g., scheduling or load balancing) using a method such as assigning a priority to a job request.
The API 133 is an interface for the application 134 to control the functions provided in the kernel 131 or the middleware 132, and includes at least one interface or function (for example, a command or a command) for file control, window control, image processing, ).
The application 134 may be an application related to the exchange of information between the electronic device 101 and an external electronic device (e.g., electronic device 102 or electronic device 104). Applications associated with information exchange may include, for example, a notification relay application for communicating specific information to an external electronic device, or a device management application for managing an external electronic device. According to various embodiments, the application 134 may include applications that are additionally specified according to the attributes (e.g., the type of electronic device) of the external electronic device (e.g., the electronic device 102 or the electronic device 104).
The input / output interface 140 may be configured to send commands or data entered from a user via a sensor (e.g., an acceleration sensor, a gyro sensor) or an input device (e.g., a keyboard or touch screen) The communication interface 160, or the security processing module 170. For example, the input / output interface 140 may provide data to the processor 120 about the user's touch input through the touch screen. The input / output interface 140 also outputs commands or data received from the processor 120, the memory 130, the communication interface 160, or the security processing module 170 via the bus 110, for example, via an output device (e.g., a speaker or a display) . For example, the input / output interface 140 can output the voice data processed through the processor 120 to the user through the speaker.
The display 150 may display various information (e.g., multimedia data or text data) to the user. The display 150 may be configured as a touch screen for inputting commands by touching or proximity touching the input means with the display. The touch screen may include a touch panel to simultaneously perform an input function and a display function. The touch panel can include a liquid-crystal display (LCD) or an active-matrix organic light-emitting diode (AM-OLED) and is flexible, transparent or wearable . The touch panel can recognize a touch input in at least one of an electrostatic, a pressure sensitive, an infrared or an ultrasonic manner. The touch panel may further include a controller. In the case of electrostatic type, the touch panel can recognize not only direct touch but also proximity touch. The proximity touch may also be referred to as contactless touch or hovering. Such a touch panel may further include a tactile layer to provide a tactile response to the user. The touch screen may include a hologram, which can show stereoscopic images in the air using interference of light. Additionally, the touch screen may further comprise a control circuit for controlling the touch panel or hologram. The touch screen and the touch panel may be represented by the display 150, unless otherwise specified in the following description.
The communication interface 160 may connect communication between the electronic device 101 and an external device (e.g., electronic device 102, electronic device 104, or server 106). For example, the communication interface 160 may be a network communication (e.g., Internet, local area network (LAN), wire area network (WAN), telecommunication network, cellular network, satellite network or plain old telephone service (POTS) (Such as wireless fidelity, Bluetooth, near field communication (NFC), infrared data association (IrDA), ANT + interface, RS-232 (recommended standard 232), or plain old telephone service (POTS)). According to one embodiment, a protocol (e.g., a local communication protocol, a network communication protocol, or a wired communication protocol) for communication between the electronic device 101 and an external device may be supported by at least one of API 133 or middleware 132. Each of the electronic devices 102, 104 may be the same (e.g., of the same type) device as the electronic device 101 or a different (e.g., different type) device.
The security processing module 170 may receive identification information of one or more other electronic devices connected by a network communication to establish the security of the specified data or designated system of the electronic device 101. The security processing module 170 can request the corresponding electronic device for identification information corresponding to the secured data or the security key of the security setting information for accessing the designated system, and based on the received identification information, The specified data or the specified system can be accessed.
The security processing module 170 may request the second electronic device to transmit the first identification information of the second electronic device in a first short range communication and to transmit the first identification information from the second electronic device to the second electronic device 1 short-range communication, and can change the received first identification information in a predetermined manner to set the first pass code of the security attribute.
The security processing module 170 may determine the identification information by one or more of a mac address, a user ID (UID), a service set ID (SSID), and a personal identification number (PIN) code. The security processing module 170 may notify the second short-range communication method in the process of requesting transmission of the first identification information of the second electronic device. The security processing module 170 may determine that the second short range communication is wireless fidelity (wifi) communication when the first identification information of the second electronic device is the MAC address. If the first identification information of the second electronic device is the UID, the security processing module 170 may determine the second short range communication as near field communication (NFC) communication. The security processing module 170 may change the first identification information in a predetermined manner, change the position of at least a part of the first identification information, and change the method of combining the first identification information and the second identification information have. The security processing module 170 requests the second electronic device for the second identification information of the second electronic device, receives the second identification information from the second electronic device, and performs security processing based on the first identification information and the second identification information Attribute can be set to the second pass code of the attribute. The security processing module 170 changes the first identification information, the second identification information, and the first identification information in a predetermined manner to change the first pass code and the second identification information set in a predetermined manner, A second passcode may be set by performing one or more of the following ways: replace at least a portion of two or more of the codes and change the position of at least two of the codes. The security processing module 170 may receive the second identification information of the third electronic device requested by the third electronic device and set the second identification information to the second pass code of the security attribute. The security processing module 170 may connect the first short range communication to one or more of NFC communication, bluetooth communication, wifi communication, infrared data association (IrDA) communication, ANT + communication, zigbee communication. The security processing module 170 executes the content of the security attribute, requests transmission of the first identification information to the second electronic device that has transmitted the identification information used in the security setting of the content, and transmits the first identification information from the second electronic device It is possible to execute the content when the result obtained by changing the first identification information in a predetermined manner is a pass code.
2 shows a block diagram 200 of a security processing module 170 of an electronic device (e.g., electronic device 101), in accordance with various embodiments. 2, the security processing module 170 may include a detection module 210, a determination module 220, and a provision module 230
The sensing module 210 may be configured to communicate with one or more other electronic devices (e.g., a second electronic device 102 or a third electronic device 103) connected in a network communication with the electronic device 101, ), Other electronic devices that can be connected, or other electronic devices that have more than one connected history.
The determination module 220 may request one or more other electronic devices specified in the electronic device 101 to transmit identification information for security key setting of the security environment. The determination module 220 can set the identification information received from another designated electronic device as it is, or a security key of a security environment for setting the changed or processed result in the electronic device 101. The determination module 220 determines The identification information may be used as it is, or the result of the modification or processing may be determined to be unlocked in the security environment set in the electronic device 101 or match the security key for secure authentication.
The providing module 230 may include one or more other electronic devices (e.g., a second electronic device 102 or a third electronic device 103) connectable to the electronic device 101 in a network communication, other electronic devices connectable to the electronic device 101, Information on the electronic device can be displayed on the display module 150. [ The providing module 230 may display information on identification information requesting transmission to another electronic device on the display module 150 of the electronic device 101. [
3A and 3B illustrate operations for processing the identification information received at the electronic device 101 according to various embodiments.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
The electronic device 101 can establish security for one or more contents to be performed in the electronic device 101 and can request a security release according to a specified security method upon invoking secured contents. The security (or security environment) set in the designated content of the electronic device 101 may be a setting for controlling the corresponding content not to be confirmed unless the security of the corresponding content is released from the electronic device 101. The electronic device 101 may be configured in a security setting to include information about a module designated in one or more other electronic devices (e.g., second electronic device 102 and / or third electronic device) Information or unique information) may be selected to be used as a passcode, and a transmission request for information on the selected designated module may be transmitted to the corresponding electronic device. The electronic device 101 can receive the corresponding information (e.g., information on the selected module) from the electronic device that requested transmission of the information on the designated module, and set the security function on the content designated based on the information on the received module Example: Set the information about the received module to the passcode of the configured security environment). The electronic device 101 may request information on the designated module when calling the secured content, and the electronic device 101 may request the second electronic device 102 and / or the third electronic device 103 It is possible to request the transmission of information about the service. The electronic device 101 can determine whether the information about the module received at the second electronic device 102 and / or the third electronic device 103 can release security of the secured content, and if the information is releasable information, Can be called.
According to one embodiment, the electronic device 101 may set security on designated content (e.g., image data) contained in the memory 130. In calling the image data, the electronic device 101 may request the second electronic device to transmit the 'mac address' of the 'wifi module' according to the security setting information set in the image data, and the 'NFC module' The transmission of the identification information of the mobile terminal 100 can be requested. The second electronic device 102 can transmit the 'mac address information' of the 'wifi module' to the electronic device 101 according to the information set in the security setting process for the designated image data of the electronic device 101, The identification information of the 'NFC module' can be transmitted to the device 101. The electronic device 101 receives the 'mac address information' of the 'wifi module' in the second electronic device 102 connected by the network communication and receives security information (for example, The wifi security 303 of the second electronic device 102) and the identification information of the 'NFC module' received from the second electronic device 103 connected by the network communication and receiving the identification information of the 'NFC module' (For example, the NFC security 305 of the third electronic device 103) set in the image data with the second security release process. The electronic device 101 can call the designated image data by performing a security release process corresponding to the designated 'wifi security 303 of the second electronic device 102' and the 'NFC security 305 of the third electronic device 103'.
The electronic device 101 may be a security key that can use the specified information of one or more other electronic devices that can be connected by network communication, A password, a pass code, or an authentication key), and may be set based on identification information of another electronic device transmitted from another designated electronic device or identification information of one or more modules included in another electronic device The security of the content can be released.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
The electronic device 101 may include one or more of the content provided by the electronic device 101 or designated identification information of another designated electronic device (e.g., the second electronic device 102) You can choose to set the identity of the included embedded module to the password of the security environment. The electronic device 101 may request the second electronic device to transmit the selected identification and the electronic device 101 may set the passcode of the secure environment to receive and set the identification information. In setting the received identification information to the passcode of the security environment, the electronic device 101 can use the received identification information as it is or change the received identification information to a designated method.
In the method of changing the received identification information, the electronic device 101 can substitute the identification information into the specified formula or algorithm, replace at least a part of the identification information with other specified information, The identification information and other specified identification information may be combined, or two or more of the above-described methods may be used in combination. Various embodiments for changing the identification information received by the electronic device 101 will be described below.
According to one embodiment, the electronic device 101 sends a request to the second electronic device 102 designated as the first security device for the mac address information of the second electronic device 102 from the second electronic device 102 to the 83-12-TZ-49-21- 14 (311) as mac address information. The electronic device 101 can directly set the received mac address information, 83-12-TZ-49-21-14 (311), as the passcode of the secure environment.
According to one embodiment, the electronic device 101 can change the received mac address information, 83-12-TZ-49-21-14 (311), to change the data in the format specified in the electronic device 101. For example, the electronic device 101 can change the data in the format specified in the electronic device 101, such as the received mac address information, 83-12-TZ-49-21-14 (311) 8312TZ492114, or one or more additional information (Eg Mac), including Mac8312TZ492114 (313), and can be set to a passcode in a secure environment.
According to one embodiment, the electronic device 101 may combine two or more identification information to generate a new type of identification information. For example, the electronic device 101 changes the SSID information received from the Mac 8312TZ492114 (313), which changed the mac address information received from the second electronic device 102 designated as the first security device, and the third electronic device 102 designated as the second security device SSIDB831J230H (317) can be combined and changed into a new type of data such as MSaScI8D3B1823T1ZJ4293201H14 (319), and can be set as a passcode of a secure environment. The electronic device 101 may set only the specified partial information of the combined MSaScI8D3B1823T1ZJ4293201H14 (319) to a passcode.
The embodiment for changing the above-mentioned identification information is for the purpose of explaining that the identification information selected by the electronic apparatus 101 can be changed and set as the pass code of the specified security environment. The present invention is not limited to the above-described method of changing the identification information, The acquired identification information can be changed. For example, in the method of changing the acquired identification information, the electronic device 101 can use a conventional encryption method such as DES (data encryption standard), caesar, monoalphabetic, vigenere, IDEA (International Data Encryption Algorithm) May be modified by applying one or more of the following.
Figures 4A-4C illustrate operations for setting security in the electronic device 101 according to various embodiments.
The electronic device 101 may include one or more identification information of a module included in one or more other electronic devices (e.g., the second electronic device 103 and / or the third electronic device 103) The security environment can be set to be used as a security key for setting the security of the designated content of the electronic device 101. [
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
The electronic device 101 may include one or more other electronic devices that are connected by a network communication or are connectable by network communication, for example, to determine the identity of another electronic device to be used as a security key when setting up a secure environment for one or more content, The second electronic device 103 and / or the third electronic device 103) and information about one or more modules that may provide identification information for each other electronic device on the display module 150 of the electronic device 101 . According to one embodiment, when the security environment is set for the designated content, the electronic device 101 transmits a message 'requesting the display module to select a module to be set as a security key (specifically, identification information of the module) Select device 401 'and display information 403 on one or more modules that provide identification information that can be set with a secret key on display module 150. For example, information on the module displayed on the display module 150 of the electronic device 101 includes information '102_001 connected: wifi 405' for the 'wifi module' of the second electronic device 102 connected by wifi communication with the electronic device 101, Information on 'NFC module' of the second electronic device connectable by communication '102_002 connectable: NFC 407' and information on the 'wifi module' of the third electronic device 103 connectable with the electronic device 101 by wifi communication; Connectable: can be wifi 409 '. The electronic device 101 can select module information (for example, the module information 405, the module information 407, or the module information 409) to be used as the security key of the content specified in the information 403 for the module displayed on the display module 150. The electronic device 101 can terminate the security environment setting of the designated content when 'cancel 411' is selected.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
When the designated module information to be used as a security key is selected in the security environment setting of the content specified in the list displayed on the display module 150, the electronic device 101 may request transmission of module information (e.g., identification information) designated to the corresponding electronic device. According to one embodiment, the electronic device 101 is configured to display the module information (e.g., information 405 on the 'wifi module' of the second electronic device 102) selected in the list (e.g., 403 in FIG. 4A) mac address' transmission request data to the second electronic device 102. The electronic device 101 can display 'requesting transmission of a wifi mac address to the device 102' for the 'mac address' transmission request to be used as a security key for security setting 421'. The second electronic device 102 determines whether to transmit the 'mac address' of the 'wifi module' to the electronic device 101 with respect to the 'mac address' transmission request data of the 'wifi module' of the second electronic device received by the electronic device 101 Can mode; An 'Accept 427' icon and a 'Reject 429' icon may be displayed on the display module 450 of the second electronic device 102, and 'Accept 427 'Icon is selected, the electronic device 101 may receive a' mac address' for the 'wifi module' of the second electronic device 102 from the second electronic device. The electronic device 101 sends the 'mac address' request data for the 'wifi module' of the second electronic device 102 to the second electronic device 102 and the corresponding 'mac address' from the second electronic device 102 The device 101 and the second electronic device can be communicated via wifi communication or designated communication to which they are connected. The electronic device 101 may terminate the security environment setting of the designated content when the 'cancel 423' icon is selected before completing receiving the 'mac address' of the 'wifi module' of the second electronic device 102 from the second electronic device.
According to one embodiment, the electronic device 101 identifies the selected module information (e.g., information 407 on the 'NFC module' of the second electronic device 102) in a list (e.g., 403 in FIG. And transmit the information transmission request data to the second electronic device. If the second electronic device 102 determines to transmit the identification information of the 'NFC module' of the second electronic device 102 to the electronic device 101, the second electronic device 102 transmits the identification information of the 'NFC module' of the second electronic device 102 to the electronic device 101 Can be transmitted. The method of transmitting and receiving data by NFC communication in the electronic device 101 and the second electronic device 102 is similar to that in the NFC communication mode of the electronic device 101 and the second electronic device 102 in that the distance between the electronic device 101 and the second electronic device It may be a method of transmitting / receiving designated data.
According to one embodiment, the electronic device 101 is configured to display the module information (e.g., information 409 on the 'wifi module' of the third electronic device 103) selected in the list (e.g., 403 in FIG. 4A) mac address' transmission request data to the third electronic device 103. It can be confirmed that the electronic device 101 is not connected to the third electronic device 103 including the selected 'wifi module' by wifi communication and can request a wifi communication connection to the third electronic device 103 by referring to the setting information of the electronic device 101 have. The electronic device 101 may request the third electronic device 103 to send a 'mac address' to the 'wifi module' of the third electronic device 103 when wifi communication is established with the third electronic device 103. Or the electronic device 101 may request a 'mac address' transmission for the 'wifi module' of the third electronic device 103 at the time of requesting the third electronic device 103 for a wifi communication mirror. The electronic device 101 may receive a 'mac address' for the 'wifi module' of the third electronic device 103 in the designated communication associated with the third electronic device 103. The electronic device 101 may terminate the security environment setting of the designated content when the 'cancel 423' icon is selected before completing receiving the 'mac address' of the 'wifi module' of the second electronic device 102 from the second electronic device.
The electronic device 101 can set the security environment of the designated content through one or more module information (e.g., identification information) included in the acquired electronic device. The electronic device 101 can process, change, or encrypt the received identification information. The electronic device 101 can determine the processed key, the changed key, and the encrypted identification information as a stored key that can release the established security environment when calling the specified content.
In various embodiments described above, the electronic device 101 may include an electronic device (e.g., a second electronic device 102 and a third electronic device 103) and / or an electronic device (e.g., a second electronic device 102 And the third electronic device 103) to request the transmission of the identification information of the corresponding module to the selected second electronic device 102 or the third electronic device 103. However, the present invention is not limited to the embodiment selected by the display module 150 And may be set in the security configuration information of the electronic device 101 to request transmission of the identification information of the second electronic device 102 connected to the electronic device 101 and / or the designated module of the third electronic device 103. The electronic device 101 may also request to transmit the identification information of the second electronic device 102 or the third electronic device 103 as well as the identification information of the module included in the second electronic device 102 or the third electronic device 103, The security key of the security environment set based on the identification information of the electronic device 102 or the identification information of the third electronic device 103 may be set.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
In setting the security environment of the designated content, the electronic device 101 may transmit one or more pieces of module information (for example, identification information of the corresponding module) included in one or more other electronic devices connected by network communication or connectable by network communication Can set more than one security environment for more than one security-specified content.
According to an exemplary embodiment, the electronic device 101 may perform a first security process for releasing a first security environment set for content designated based on a 'wifi mac address' of the second electronic device 102 in an operation of setting a security environment for the designated content In the state where the key is set, one or more security environments may be provided for further setting. The electronic device 101 transmits the content designated on the basis of the identification information of the module information 433 displayed on the display module 150 to the 'NFC module' of the second electronic device 102 or the 'wifi module' of the third electronic device 103, A second security key capable of releasing the environment can be set. The electronic device 101 can set a plurality of security environments for the content specified based on the identification information of a designated module included in one or more other electronic devices connectable via network communication as described above.
5A and 5B illustrate an operation of releasing a security environment set in the electronic device 101 according to various embodiments.
The electronic device 101 can request the transmission of the identification information of the module corresponding to the sperm device (for example, the second electronic device 102) specified in the security setting information when calling the secured system or data, Can be released.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
When the electronic device 101 calls contents for which the security environment is set, the electronic device 101 can determine whether or not an electronic device (for example, a second electronic device) transmitting the security key set in the secure environment of the designated content is connected to the network communication have. The electronic device 101 may request transmission of identification information for a designated module of the second electronic device 102 designated in the security configuration information of the designated content when the second electronic device 102 is connected by a network communication, Upon receipt of the identification information of the module, the security of the designated content set in the security environment can be released. According to one embodiment, when the electronic device 101 has selected to secure the specified content (e.g., image data), the security key set in the security environment setting information of the image data (e.g., 'mac address' ) Is connected to the " wifi communication ". When the electronic device 101 confirms that the second electronic device 101 is connected by 'wifi communication', it may request the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 may terminate the 'mac address' transmission request and reception operation of the second electronic device 102 by selecting the 'cancel 503' icon before receiving the requested 'mac address' to the second electronic device 102.
According to one embodiment, when the electronic device 101 has selected to secure the specified content (e.g., image data), the security key set in the security environment setting information of the image data (e.g., 'mac address' ) Is connected to the second electronic device 102 via network communication. When the electronic device 101 confirms that the second electronic device 101 is connected by network communication, it can request the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 receives the 'wifi mac address' of the second electronic device 102 from the second electronic device 102 to release the security setting of the designated image data, and in the 'wifi communication' of the second electronic device 102 Wifi mac address' transmitted from the 'wifi module' of the device 102), the security setting of the designated image data can be released. Electronic device 101 or wpo 2 electronic device 102 may request a " wifi communication " connection to a partner electronic device if it is confirmed that a 'wifi communication' is not connected between electronic device 101 and second electronic device 102. The electronic device 101 may receive a 'wifi mac address' of the second electronic device 102 at the second electronic device 102 in a 'wifi communication'. The electronic device 101 may terminate the 'mac address' transmission request and reception operation of the second electronic device 102 by selecting the 'cancel 503' icon before receiving the requested 'mac address' to the second electronic device 102.
According to one embodiment, when electronic device 101 requests second electronic device 102 to transmit identification information (e.g., 'mac address') for a designated communication module (e.g., a 'wifi module') of second electronic device 102 , The second electronic device 102 may display a message 'request for transmission of wifi address for unsecure from first electronic device 505' corresponding to display module 250. The second electronic device 102 may transmit the 'wifi mac address' of the second electronic device 102 to the electronic device 102 when the 'transmit 507' icon is selected, and the first electronic device 101 Wifi mac address' of the second electronic device 102 that requested transmission.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
The electronic device 101 receives the identification information about one or more of the various modules included in the second electronic device 102 and sets the security environment so as to set the specified data of the electronic device 101 or the security system of the specified system as security . In setting the security key, the electronic device 101 may request transmission of the secured identification information in the second electronic device 102. [ According to one embodiment, in setting the security key of the designated security environment, the electronic device 101 may determine that the identification information of the second electronic device 102 requesting transmission to the designated second electronic device is an identification of the network communication module such as 'wifi module' It is not limited to information but may be requested to transmit various identification information such as a subscriber identity module (SIM), identification information stored in a universal subscriber identity module (USIM), user identification information, and SSID (service set identifier) . The second electronic device 102 may be configured to access various identification information, such as a subscriber identity module (SIM), identification information stored in a universal subscriber identity module (USIM), user identification information, service set identifier (SSID) One or more security environments can be configured to enter security keys. For example, if the second electronic device 102 is requested to transmit identification information (e.g., PIN (personal identification number (PIN) code 515) stored in the SIM from the first electronic device, the second electronic device 102 accesses the identification information stored in the SIM And may transmit the identification information stored in the SIM of the second electronic device 102 to the first electronic device 101 when it is determined that the correct security key has been input. The electronic device 101 completes a security key entry that allows access to the identification information stored in the SIM during the provision 517 or at the second electronic device 102 to enter a security key that allows access to the identification information stored in the SIM at the second electronic device 102 When 'cancel 519' is selected before, the operation of transmitting the identification information stored in the SIM of the second electronic device 102 to the electronic device 101 may be terminated.
6A and 6B show the flow of a security setting operation in the electronic device 101 according to various embodiments.
The electronic device 101 may request to send the specified identification information to a designated electronic device (e.g., the second electronic device 102 and / or the third electronic device 103) that can connect to the network communication when setting up a secure environment for the specified content or system have. The electronic device 101 can receive the requested identification information, and can set the security environment set as a security key used for releasing or security authentication.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
At operation 601, the electronic device 101 may request transmission of the identified identification information to the second electronic device 102. According to one embodiment, in requesting identification information of a designated second electronic device 102, the electronic device 101 may determine whether it is in a network communication with the second electronic device 102. For example, when the electronic device 101 requests the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102, it determines whether the second electronic device 102 is connected to the second electronic device 102 by 'wifi communication' . The electronic device 101 may request transmission of the 'mac address' of the 'wifi module' of the second electronic device 102 in a different communication manner if the electronic device 101 is not in a 'wifi communication' state with the second electronic device 102. The electronic device 101 may request the second electronic device 102 to transmit the 'mac address' of the 'wifi module' of the second electronic device 102 in 'bluetooth communication' to 'wifi communication'.
At operation 603, the electronic device 101 may receive the identification information of the second electronic device 102 requested from the second electronic device 102. According to one embodiment, the electronic device 101 may receive the 'mac address' of the 'wifi module' of the second electronic device that requested the second electronic device 102. For example, the second electronic device 102 may determine whether it is in wifi communication with the first electronic device 101 in response to a 'mac address' transmission request of a second electronic device 'wifi module' received from the first electronic device 101 have. If the electronic device 101 and the second electronic device 102 are not in a "wifi communication" state, the first electronic device 101 or the second electronic device 102 may perform a "wifi communication" connection request to the partner electronic device. The electronic device 101 may receive the 'wifi mac address' of the second electronic device 102 from the second electronic device 102 upon confirming that it is connected by 'wifi communication' with the second electronic device 102.
In operation 605, the electronic device 101 may set the received identification information as a security key for releasing the security of the specified security environment or a security key for security authentication. According to one embodiment, the electronic device 101 may set the 'wifi mac address' of the received second electronic device 102 to a passcode that can access the secured data of the electronic device 101. Alternatively, the electronic device 101 may encrypt, process or change the 'wifi mac address' of the received second electronic device 102 in a designated manner and set it as a security key. The electronic device 101 may receive the identification information of the specified security key from the designated electronic device 101 to access the secured data after the security setting process, and may then unsecure the corresponding security environment or perform the security authentication procedure.
The electronic device 101 may terminate the embodiment of FIG. 6A by performing an operation 605.
According to various embodiments, there is provided a method of operating a first electronic device, the method comprising: requesting a second electronic device to transmit identification information of the second electronic device; receiving the identification information from the second electronic device; , And setting the received identification information as a passcode.
According to various embodiments, the passcode may be set in the data or system specified in the first electronic device. According to various embodiments, the step of setting the identification information as a pass code may further include setting a result of performing at least one of changing, processing and encrypting the received identification information to a pass code . According to various embodiments, the identification information may be determined by one or more of a mac address of a wifi module, a UID, an SSID, and a PIN code of an NFC module. According to various embodiments, the identification information may be received by wifi communication when the identification information is a MAC address, and may be received by NFC communication when the identification information is a UID. According to various embodiments, there is provided a method comprising: requesting a second electronic device for a second identification of the second electronic device; receiving the second identification information from the second electronic device; And setting the information to the second pass code. According to various embodiments, there is provided a method comprising: requesting a second electronic device for a second identification of the third electronic device; receiving the second identification information from the second electronic device; And setting the information to the second pass code. According to various embodiments, the first electronic device and the second electronic device may be connected in one or more of NFC communication, bluetooth communication, wifi communication, IrDA communication, ANT + communication, zigbee communication. According to various embodiments, the identification information may be received when a second pass code according to a security setting specified in the second electronic device is input in the second electronic device.
Hereinafter, various embodiments of the present invention will be described with reference to FIG. 6B.
The electronic device 101 may request to send the specified identification information to a designated electronic device (e.g., the second electronic device 102 and / or the third electronic device 103) that can connect to the network communication when setting up a secure environment for the specified content or system have. The electronic device 101 can receive the requested identification information, and can set the security environment set as a security key used for releasing or security authentication.
Hereinafter, various embodiments of the present invention will be described with reference to FIG.
At operation 611, the electronic device 101 may perform operations to select a content or system to set a secure environment. The content or system that sets the security environment in the electronic device 101 may be used in the electronic device 101, such as one or more programs, image data, sound data, information storage data, It can be various data.
At operation 613, the electronic device 101 may display another electronic device (e.g., the second electronic device 102 or the third electronic device 103), which is connectable by network communication or having a history of connecting to the network communication more than once. According to one embodiment, the electronic device 101 may include other electronic devices, such as other electronic devices connectable at the electronic device 101, or other electronic devices connected at the electronic device 101 via one or more network communication modules (e.g., a "wifi module" Information on another electronic device having a connection history at least once can be displayed on the display module 150. [ Or identification information (e.g. PIN information of the SIM card) of the module included in the second electronic device 102 promised to the electronic device 101 or another designated electronic device (e.g., the second electronic device 102) can be displayed on the display module 150 have.
At operation 615, the electronic device 101 may select a designated module of the second electronic device 102 or the second electronic device 102 to set the security environment as a security key for unlocking or security authentication. The electronic device 101 may request the second electronic device 102 to transmit the identification information of the selected second electronic device 102 or the identification information of the designated module of the second electronic device 102. [
At operation 617, the electronic device 101 may receive the requested identification information from the second electronic device 102. When receiving the identification information requested by the second electronic device 102, the electronic device 101 transmits the identification information of the communication module of the second electronic device 102 to the electronic device 102 through the corresponding designated communication, 101 in accordance with the present invention. According to one embodiment, when requesting the 'mac address' transmission of the 'wifi module' of the second electronic device 102 from the electronic device 101 to the second electronic device 102, the electronic device 101 transmits a 'wifi communication' Wifi mac address' of the second electronic device 102, which is received by the electronic device 101, as a security key of the security environment set by the electronic device 101.
In operation 619, the electronic device 101 may set a security environment based on the identification information received by the second electronic device, and may generate a security key for releasing the security environment in which the received identification information is set, It can be set as a security key. According to one embodiment, the electronic device 101 can use the received identification information as it is, or set the security key using the result of at least one of change, processing, and encryption.
The electronic device 101 may terminate the embodiment of FIG. 6B by performing an operation 619. FIG.
FIG. 7 shows a flow of operations for processing secured data in the electronic device 101 according to various embodiments.
In order for the electronic device 101 to access secured data, the electronic device 101 may request transmission of the identification information of another electronic device specified in the security setting information. The electronic device 101 can receive the identification information of the received designated electronic device and compare it with the secured security key, and when it is matched, can release the specified security or complete the security authentication.
At operation 701, the electronic device 101 accesses the designated data of the secured electronic device 101 or the designated system of the electronic device 101 based on the first module information of the second electronic device (e.g., the 'mac address' of the 'wifi module' Lt; / RTI > The electronic device 101 may display information on a secured state and / or information on a state requiring a security key input on the display module 150 when the designated data or the designated system is called.
In operation 703, the electronic device 101 may request security device identification information transmitted to another electronic device set corresponding to the security key by referring to security-related data or security-setting information of the security-enhanced system. According to one embodiment, the electronic device 101 can confirm the specified data in the security setting information of the data that is specified as being secured to the 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 may request the second electronic device 102 to transmit a 'mac address' of the 'wifi module' of the second electronic device 102. The electronic device 101 can determine whether the second electronic device 102 receiving the security key according to the security setting information of the designated content is connected to the network communication. The electronic device 101 may request the second electronic device 102 to transmit identification information of the security key set in the security environment of the first electronic device when the second electronic device 102 is connected by a network communication. The electronic device 101 may request a network communication connection to the second electronic device 102 if it determines that the second electronic device 102 is not connected by a network communication. According to one embodiment, the electronic device 101 may determine that the security key is set based on the 'mac address' of the 'wifi module' of the second electronic device 102 in the security configuration information, wifi communication ". The electronic device 101 may request a 'wifi communication' connection to the second electronic device 102 upon confirming that the electronic device 101 is not connected to the second electronic device 102 by 'wifi communication'.
In operation 705, the electronic device 101 can compare with the security key set in the security environment designated by the received identification information, and when it is matched, release the specified security or authenticate the specified security to access the specified data or the designated system. According to one embodiment, the electronic device 101 receives identification information (e.g., 'mac address' of the 'wifi module' of the second electronic device) received at the second electronic device 102, Depending on the security key, it can be changed, processed or encrypted. If it matches the set security key, the security environment can be released or the designated data or the designated system can be accessed.
The electronic device 101 terminates the embodiment of FIG. 7 by performing an operation 705.
Based on various embodiments of the present invention described above, the first electronic device 101 may request the second electronic device 102 to transmit the first identification information of the second electronic device 102 in a first short distance communication, Receiving first identification information from the electronic device 102 in a second short-range communication that is the same as or different from the first short-range communication; changing the received first identification information in a predetermined manner to generate a first- .
Various embodiments that illustrate the present invention may be performed by one or more programs, one or more processors (e.g., processor 120), and security processing module 170 that the memory of electronic device 101 includes. Each of the above-described components of the electronic device according to various embodiments of the present invention may be composed of one or more components, and the name of the component may be changed according to the type of the electronic device. The electronic device according to various embodiments of the present invention may be configured to include at least one of the above-described components, and some components may be omitted or further include other additional components. In addition, some of the components of the electronic device according to various embodiments of the present invention may be combined into one entity, so that the functions of the components before being combined can be performed in the same manner.
According to various embodiments, at least a portion of an apparatus, method, and / or method in accordance with the various embodiments described in the claims of the present invention and / or the specification may be implemented in a form including hardware, software, firmware or a combination of two or more of hardware, (E.g., a module, a unit). A module may be a minimum unit or a portion thereof that performs various embodiments of the present invention as a minimum unit or a part of an integrally constructed component. The module may be implemented mechanically or electronically. When implemented in software, a computer-readable storage medium (or computer-readable storage medium) for storing one or more programs (or programming modules) may be provided. For example, the software may be embodied in instructions stored on a computer-readable storage medium in the form of a programming module. The one or more programs may include instructions that cause the electronic device to perform the methods according to the embodiments of the invention and / or the claims of the present invention. The instructions, when executed by one or more processors (e.g., the processor 120), may cause the one or more processors to perform functions corresponding to the instructions. The computer readable storage medium may be, for example, the memory 130. At least some of the programming modules may be implemented (e.g., executed) by, for example, the processor 120. At least some of the programming modules may include, for example, modules, programs, routines, sets of instructions or processes, etc. to perform one or more functions.
The computer-readable recording medium includes a magnetic medium such as a hard disk, a floppy disk and a magnetic tape, an optical recording medium such as a CD-ROM (Compact Disc Read Only Memory), a DVD (Digital Versatile Disc) A magneto-optical medium such as a floppy disk and a program command such as a ROM (Read Only Memory), a RAM (Random Access Memory), a flash memory, (EEPROM), a magnetic disc storage device or other type of optical storage device, a magnetic storage device such as a magneto- A magnetic cassette may be included. Or a combination of some or all of these. In addition, a plurality of constituent memories may be included.
In addition, electronic devices may be connected to a communication network, such as the Internet, an Intranet, a LAN (Local Area Network), a WLAN (Wide Area Network), or a communication network such as a SAN (Storage Area Network) And can be stored in an attachable storage device that can be accessed. Such a storage device may be connected to the electronic device through an external port. Further, a separate storage device on the communication network may be connected to the portable electronic device. The hardware devices described above may be configured to operate as one or more software modules to perform operations on the various embodiments of the present invention, and vice versa.
Modules or programming modules according to various embodiments of the present invention may include at least one or more of the elements described above, some of which may be omitted, or may further include other additional elements. Operations performed by modules, programming modules, or other components in accordance with various embodiments of the invention may be performed in a sequential, parallel, iterative, or heuristic manner. Also, some operations may be performed in a different order, omitted, or other operations may be added.
The embodiments of the present invention disclosed in the present specification and drawings are merely illustrative examples of the present invention and are not intended to limit the scope of the present invention in order to facilitate understanding of the present invention. Accordingly, the scope of the present invention should be construed as being included in the scope of the present invention without departing from the scope and spirit of the invention as disclosed in the accompanying claims.