WO2021187730A1 - Procédé et dispositif pour fournir une localisation en utilisant un dispositif périphérique - Google Patents

Procédé et dispositif pour fournir une localisation en utilisant un dispositif périphérique Download PDF

Info

Publication number
WO2021187730A1
WO2021187730A1 PCT/KR2020/019076 KR2020019076W WO2021187730A1 WO 2021187730 A1 WO2021187730 A1 WO 2021187730A1 KR 2020019076 W KR2020019076 W KR 2020019076W WO 2021187730 A1 WO2021187730 A1 WO 2021187730A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
information
time encryption
time
location
Prior art date
Application number
PCT/KR2020/019076
Other languages
English (en)
Korean (ko)
Inventor
이경희
정재연
Original Assignee
삼성전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 삼성전자 주식회사 filed Critical 삼성전자 주식회사
Publication of WO2021187730A1 publication Critical patent/WO2021187730A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Definitions

  • the electronic device provides a photographing function, a document editing function, an Internet function, and a payment function, so that a user can take a picture using the electronic device instead of a camera, edit a document using the electronic device instead of a laptop computer, or perform Internet processing can be used, and payment can be made using an electronic device instead of a card or cash.
  • the electronic device occupies an important part in a user's life, and since the user always carries the electronic device, it is necessary to take preventive measures against a loss situation.
  • the Find My Device service may provide a function of finding the location of the electronic device, backing up data in the electronic device to a cloud server, locking the screen, blocking payment services, or deleting all data stored in the electronic device.
  • the location finding function of the electronic device may provide an approximate location or route of the lost electronic device. For example, when location transmission of the electronic device is activated, the location before the electronic device is turned off may be transmitted to the server.
  • the server may check the location of the electronic device only when the electronic device is connected to a network such as WiFi or a wide area network (WAN). For example, location information cannot be provided to the server while the electronic device is in a network environment in which the electronic device is not directly connected to the server or is connected to a personal area network (PAN) such as Bluetooth or ultra wideband (UWB). Also, the location information of the electronic device may be the location information of the user. When the location information of the electronic device is stored in the server, since there is a risk of exposure to a server operator or a service provider, privacy protection issues for user location information may occur.
  • a network such as WiFi or a wide area network (WAN).
  • PAN personal area network
  • UWB ultra wideband
  • the first electronic device broadcasts the one-time encryption key to the peripheral device, the peripheral device receiving the one-time encryption key encrypts and transmits its location information to the server, and the first electronic device and the decryption key
  • the second electronic device that has shared It can be disclosed with respect to a method and apparatus that can be used.
  • An electronic device includes a communication module, a memory, and a processor operatively connected to the communication module or the memory, wherein the processor receives one-time encryption information from another electronic device through the communication module and , obtain the location information of the electronic device using the communication module, encrypt the location information based on the one-time encryption information, and transmit the encrypted location information and the one-time encryption information to the server. .
  • An electronic device includes a communication module, a memory, and a processor operatively connected to the communication module or the memory, wherein the processor receives a user input requesting a location of another electronic device, and A location of a peripheral device that obtains one-time encryption information based on a decryption key shared with another electronic device, transmits the one-time encryption information to a server using the communication module, and corresponds to a location of the other electronic device from the server It can be configured to receive information.
  • a method of operating an electronic device includes receiving one-time encryption information from another electronic device through a communication module of the electronic device, acquiring location information of the electronic device using the communication module, and The method may include encrypting the location information based on the one-time encryption information, and transmitting the encrypted location information and the one-time encryption information to a server.
  • the location of the electronic device may be obtained from location information of the peripheral device by using the peripheral device even in a situation in which a network connection in which the electronic device is directly connected to the server is impossible.
  • the privacy of the location information may be enhanced.
  • FIG. 1 is a block diagram of an electronic device in a network environment according to various embodiments of the present disclosure
  • FIGS. 2A and 2B are diagrams illustrating a network environment between an electronic device, a nearby electronic device, and a server according to various embodiments of the present disclosure
  • FIG. 3 is a flowchart illustrating an operation method between an electronic device, a nearby electronic device, and a server according to various embodiments of the present disclosure
  • FIG. 4 is a flowchart illustrating a method of operating an electronic device of a user according to various embodiments of the present disclosure
  • FIG. 5 is a flowchart illustrating a method of operating a peripheral electronic device according to various embodiments of the present disclosure
  • FIG. 6 is a flowchart illustrating a method of providing a location of a nearby electronic device according to various embodiments of the present disclosure
  • FIG. 7 is a flowchart illustrating a method of operating an electronic device of a user according to various embodiments of the present disclosure
  • FIG. 8 is a flowchart illustrating a method of providing a location of a user's electronic device according to various embodiments of the present disclosure
  • the electronic device may have various types of devices.
  • the electronic device may include, for example, a portable communication device (eg, a smart phone), a computer device, a portable multimedia device, a portable medical device, a camera, a wearable device, or a home appliance device.
  • a portable communication device eg, a smart phone
  • a computer device e.g., a smart phone
  • a portable multimedia device e.g., a portable medical device
  • a camera e.g., a portable medical device
  • a camera e.g., a portable medical device
  • a camera e.g., a portable medical device
  • a wearable device e.g., a smart bracelet
  • a home appliance device e.g., a home appliance
  • first”, “second”, or “first” or “second” may simply be used to distinguish the component from other components in question, and may refer to components in other aspects (e.g., importance or order) is not limited. It is said that one (eg, first) component is “coupled” or “connected” to another (eg, second) component, with or without the terms “functionally” or “communicatively”. When referenced, it means that one component can be connected to the other component directly (eg by wire), wirelessly, or through a third component.
  • module may include a unit implemented in hardware, software, or firmware, and may be used interchangeably with terms such as, for example, logic, logic block, component, or circuit.
  • a module may be an integrally formed part or a minimum unit or a part of the part that performs one or more functions.
  • the module may be implemented in the form of an application-specific integrated circuit (ASIC).
  • ASIC application-specific integrated circuit
  • FIG. 1 is a block diagram of an electronic device 101 in a network environment 100 according to various embodiments.
  • an electronic device 101 communicates with an electronic device 102 through a first network 198 (eg, a short-range wireless communication network) or a second network 199 . It may communicate with the electronic device 104 or the server 108 through (eg, a long-distance wireless communication network). According to an embodiment, the electronic device 101 may communicate with the electronic device 104 through the server 108 .
  • a first network 198 eg, a short-range wireless communication network
  • a second network 199 e.g., a second network 199 . It may communicate with the electronic device 104 or the server 108 through (eg, a long-distance wireless communication network). According to an embodiment, the electronic device 101 may communicate with the electronic device 104 through the server 108 .
  • the electronic device 101 includes a processor 120 , a memory 130 , an input device 150 , a sound output device 155 , a display device 160 , an audio module 170 , and a sensor module ( 176 , interface 177 , haptic module 179 , camera module 180 , power management module 188 , battery 189 , communication module 190 , subscriber identification module 196 , or antenna module 197 . ) may be included. In some embodiments, at least one of these components (eg, the display device 160 or the camera module 180 ) may be omitted or one or more other components may be added to the electronic device 101 . In some embodiments, some of these components may be implemented as one integrated circuit. For example, the sensor module 176 (eg, a fingerprint sensor, an iris sensor, or an illuminance sensor) may be implemented while being embedded in the display device 160 (eg, a display).
  • the sensor module 176 eg, a fingerprint sensor, an iris sensor, or an illuminance sensor
  • the processor 120 for example, executes software (eg, a program 140) to execute at least one other component (eg, a hardware or software component) of the electronic device 101 connected to the processor 120 . It can control and perform various data processing or operations. According to one embodiment, as at least part of data processing or operation, the processor 120 converts commands or data received from other components (eg, the sensor module 176 or the communication module 190 ) to the volatile memory 132 . may be loaded into the volatile memory 132 , process commands or data stored in the volatile memory 132 , and store the resulting data in the non-volatile memory 134 .
  • software eg, a program 140
  • the processor 120 converts commands or data received from other components (eg, the sensor module 176 or the communication module 190 ) to the volatile memory 132 .
  • the volatile memory 132 may be loaded into the volatile memory 132 , process commands or data stored in the volatile memory 132 , and store the resulting data in the non-volatile memory 134 .
  • the processor 120 includes a main processor 121 (eg, a central processing unit or an application processor), and a secondary processor 123 (eg, a graphics processing unit, an image signal processor) that can be operated independently or in conjunction with the main processor 121 . , a sensor hub processor, or a communication processor). Additionally or alternatively, the auxiliary processor 123 may be configured to use less power than the main processor 121 or to be specialized for a designated function. The auxiliary processor 123 may be implemented separately from or as a part of the main processor 121 .
  • a main processor 121 eg, a central processing unit or an application processor
  • a secondary processor 123 eg, a graphics processing unit, an image signal processor
  • the auxiliary processor 123 may be configured to use less power than the main processor 121 or to be specialized for a designated function.
  • the auxiliary processor 123 may be implemented separately from or as a part of the main processor 121 .
  • the auxiliary processor 123 may be, for example, on behalf of the main processor 121 while the main processor 121 is in an inactive (eg, sleep) state, or when the main processor 121 is active (eg, executing an application). ), together with the main processor 121, at least one of the components of the electronic device 101 (eg, the display device 160, the sensor module 176, or the communication module 190) It is possible to control at least some of the related functions or states.
  • the coprocessor 123 eg, an image signal processor or a communication processor
  • may be implemented as part of another functionally related component eg, the camera module 180 or the communication module 190. have.
  • the memory 130 may store various data used by at least one component (eg, the processor 120 or the sensor module 176 ) of the electronic device 101 .
  • the data may include, for example, input data or output data for software (eg, the program 140 ) and instructions related thereto.
  • the memory 130 may include a volatile memory 132 or a non-volatile memory 134 .
  • the program 140 may be stored as software in the memory 130 , and may include, for example, an operating system 142 , middleware 144 , or an application 146 .
  • the input device 150 may receive a command or data to be used by a component (eg, the processor 120 ) of the electronic device 101 from the outside (eg, a user) of the electronic device 101 .
  • the input device 150 may include, for example, a microphone, a mouse, a keyboard, or a digital pen (eg, a stylus pen).
  • the sound output device 155 may output a sound signal to the outside of the electronic device 101 .
  • the sound output device 155 may include, for example, a speaker or a receiver.
  • the speaker can be used for general purposes such as multimedia playback or recording playback, and the receiver can be used to receive incoming calls. According to one embodiment, the receiver may be implemented separately from or as part of the speaker.
  • the display device 160 may visually provide information to the outside (eg, a user) of the electronic device 101 .
  • the display device 160 may include, for example, a display, a hologram device, or a projector and a control circuit for controlling the corresponding device.
  • the display device 160 may include a touch circuitry configured to sense a touch or a sensor circuit (eg, a pressure sensor) configured to measure the intensity of a force generated by the touch. have.
  • the audio module 170 may convert a sound into an electric signal or, conversely, convert an electric signal into a sound. According to an embodiment, the audio module 170 acquires a sound through the input device 150 , or an external electronic device (eg, a sound output device 155 ) connected directly or wirelessly with the electronic device 101 . The sound may be output through the electronic device 102 (eg, a speaker or a headphone).
  • an external electronic device eg, a sound output device 155
  • the sound may be output through the electronic device 102 (eg, a speaker or a headphone).
  • the sensor module 176 detects an operating state (eg, power or temperature) of the electronic device 101 or an external environmental state (eg, user state), and generates an electrical signal or data value corresponding to the sensed state. can do.
  • the sensor module 176 may include, for example, a gesture sensor, a gyro sensor, a barometric pressure sensor, a magnetic sensor, an acceleration sensor, a grip sensor, a proximity sensor, a color sensor, an IR (infrared) sensor, a biometric sensor, It may include a temperature sensor, a humidity sensor, or an illuminance sensor.
  • the interface 177 may support one or more designated protocols that may be used for the electronic device 101 to directly or wirelessly connect with an external electronic device (eg, the electronic device 102 ).
  • the interface 177 may include, for example, a high definition multimedia interface (HDMI), a universal serial bus (USB) interface, an SD card interface, or an audio interface.
  • HDMI high definition multimedia interface
  • USB universal serial bus
  • SD card interface Secure Digital Card
  • the connection terminal 178 may include a connector through which the electronic device 101 can be physically connected to an external electronic device (eg, the electronic device 102 ).
  • the connection terminal 178 may include, for example, an HDMI connector, a USB connector, an SD card connector, or an audio connector (eg, a headphone connector).
  • the haptic module 179 may convert an electrical signal into a mechanical stimulus (eg, vibration or movement) or an electrical stimulus that the user can perceive through tactile or kinesthetic sense.
  • the haptic module 179 may include, for example, a motor, a piezoelectric element, or an electrical stimulation device.
  • the camera module 180 may capture still images and moving images. According to an embodiment, the camera module 180 may include one or more lenses, image sensors, image signal processors, or flashes.
  • the power management module 188 may manage power supplied to the electronic device 101 .
  • the power management module 188 may be implemented as, for example, at least a part of a power management integrated circuit (PMIC).
  • PMIC power management integrated circuit
  • the battery 189 may supply power to at least one component of the electronic device 101 .
  • battery 189 may include, for example, a non-rechargeable primary cell, a rechargeable secondary cell, or a fuel cell.
  • the communication module 190 is a direct (eg, wired) communication channel or a wireless communication channel between the electronic device 101 and an external electronic device (eg, the electronic device 102, the electronic device 104, or the server 108). It can support establishment and communication through the established communication channel.
  • the communication module 190 may include one or more communication processors that operate independently of the processor 120 (eg, an application processor) and support direct (eg, wired) communication or wireless communication.
  • the communication module 190 is a wireless communication module 192 (eg, a cellular communication module, a short-range wireless communication module, or a global navigation satellite system (GNSS) communication module) or a wired communication module 194 (eg, : It may include a local area network (LAN) communication module, or a power line communication module).
  • a wireless communication module 192 eg, a cellular communication module, a short-range wireless communication module, or a global navigation satellite system (GNSS) communication module
  • GNSS global navigation satellite system
  • wired communication module 194 eg, : It may include a local area network (LAN) communication module, or a power line communication module.
  • the corresponding communication module is a first network 198 (eg, a short-range communication network such as Bluetooth, Ultra-Wide Band (UWB), WiFi direct or IrDA (infrared data association)) or a second network 199 (eg: A cellular network, the Internet, or a telecommunication network such as a computer network (eg LAN or WAN) may communicate with an external electronic device.
  • a first network 198 eg, a short-range communication network such as Bluetooth, Ultra-Wide Band (UWB), WiFi direct or IrDA (infrared data association)
  • a second network 199 For example: A cellular network, the Internet, or a telecommunication network such as a computer network (eg LAN or WAN) may communicate with an external electronic device.
  • the wireless communication module 192 uses the subscriber information (eg, International Mobile Subscriber Identifier (IMSI)) stored in the subscriber identification module 196 within a communication network such as the first network 198 or the second network 199 .
  • the electronic device 101 may be identified and authenticated.
  • the antenna module 197 may transmit or receive a signal or power to the outside (eg, an external electronic device).
  • the antenna module may include one antenna including a conductor formed on a substrate (eg, a PCB) or a radiator formed of a conductive pattern.
  • the antenna module 197 may include a plurality of antennas. In this case, at least one antenna suitable for a communication method used in a communication network such as the first network 198 or the second network 199 is connected from the plurality of antennas by, for example, the communication module 190 . can be selected. A signal or power may be transmitted or received between the communication module 190 and an external electronic device through the selected at least one antenna.
  • other components eg, RFIC
  • other than the radiator may be additionally formed as a part of the antenna module 197 .
  • peripheral devices eg, a bus, general purpose input and output (GPIO), serial peripheral interface (SPI), or mobile industry processor interface (MIPI)
  • GPIO general purpose input and output
  • SPI serial peripheral interface
  • MIPI mobile industry processor interface
  • the command or data may be transmitted or received between the electronic device 101 and the external electronic device 104 through the server 108 connected to the second network 199 .
  • Each of the electronic devices 102 and 104 may be the same or a different type of the electronic device 101 .
  • all or part of the operations performed by the electronic device 101 may be executed by one or more of the external electronic devices 102 , 104 , or 108 .
  • the electronic device 101 may perform the function or service itself instead of executing the function or service itself.
  • one or more external electronic devices may be requested to perform at least a part of the function or the service.
  • the one or more external electronic devices that have received the request may execute at least a part of the requested function or service, or an additional function or service related to the request, and transmit a result of the execution to the electronic device 101 .
  • the electronic device 101 may process the result as it is or additionally and provide it as at least a part of a response to the request.
  • cloud computing distributed computing, or client-server computing technology This can be used.
  • Various embodiments of the present document include one or more instructions stored in a storage medium (eg, internal memory 136 or external memory 138) readable by a machine (eg, electronic device 101).
  • a machine eg, electronic device 101
  • the processor eg, the processor 120
  • the device eg, the electronic device 101
  • the one or more instructions may include code generated by a compiler or code executable by an interpreter.
  • the device-readable storage medium may be provided in the form of a non-transitory storage medium.
  • 'non-transitory' only means that the storage medium is a tangible device and does not include a signal (eg, electromagnetic wave), and this term is used in cases where data is semi-permanently stored in the storage medium and It does not distinguish between temporary storage cases.
  • a signal eg, electromagnetic wave
  • the method according to various embodiments disclosed in this document may be provided as included in a computer program product.
  • Computer program products may be traded between sellers and buyers as commodities.
  • the computer program product is distributed in the form of a machine-readable storage medium (eg compact disc read only memory (CD-ROM)), or via an application store (eg Play Store TM ) or on two user devices ( It can be distributed (eg downloaded or uploaded) directly, online between smartphones (eg: smartphones).
  • a part of the computer program product may be temporarily stored or temporarily generated in a machine-readable storage medium such as a memory of a server of a manufacturer, a server of an application store, or a relay server.
  • each component eg, a module or a program of the above-described components may include a singular or a plurality of entities.
  • one or more components or operations among the above-described corresponding components may be omitted, or one or more other components or operations may be added.
  • a plurality of components eg, a module or a program
  • the integrated component may perform one or more functions of each component of the plurality of components identically or similarly to those performed by the corresponding component among the plurality of components prior to the integration. .
  • operations performed by a module, program, or other component are executed sequentially, in parallel, repeatedly, or heuristically, or one or more of the operations are executed in a different order, or omitted. or one or more other operations may be added.
  • FIGS. 2A and 2B are diagrams illustrating a network environment between an electronic device, a nearby electronic device, and a server according to various embodiments of the present disclosure
  • FIG. 2A is a diagram illustrating a first network environment 200 between an electronic device, a nearby electronic device, and a server according to various embodiments of the present disclosure.
  • the user device 210 may be a device owned by the user or another user (eg, family member or friend) associated with the user.
  • the user device 210 may be various types of electronic devices such as a smart phone, a laptop computer, a desktop computer, a wireless earphone, a Bluetooth speaker, a wearable device, and a car key.
  • the user device 210 may include a first electronic device (eg, the electronic device 101 of FIG. 1 ), a first user device 211 , a second user device 213 , or a second electronic device 215 .
  • the first user device 211 may be a wireless earphone
  • the second user device 213 may be a wearable device. This is only an example to help the understanding of the invention, but does not limit the content of the invention.
  • the first electronic device 101 generates a decryption key and includes devices included in the user device 210 (eg, the first user device 211 , the second user device 213 , or the second electronic device 215 ). ) can be shared with Alternatively, the second electronic device 215 may generate a decryption key and share it with devices included in the user device 210 .
  • the first electronic device 101 may generate a one-time encryption key every set period (eg, 10 minutes, 30 minutes, 1 hour) using the decryption key. Alternatively, the first electronic device 101 may generate a hash value of the one-time encryption key every set period by using the decryption key.
  • a situation in which the first user device 211 or the second user device 213 is lost because the decryption key is also shared with the first user device 211 or the second user device 213 included in the user device 210 . may operate similarly to a situation in which the first electronic device 101 is lost.
  • the shared decryption key may correspond to a private key
  • the generated one-time encryption key may correspond to a public key.
  • One decryption key and one one-time encryption key corresponding to the one encryption key may be configured as a pair.
  • Information encrypted with the one-time encryption key may be decrypted (eg, decrypted) using the decryption key.
  • the first electronic device 101 may store a decryption key and a one-time encryption key (eg, encryption pair information) corresponding to the decryption key in a memory (eg, the memory 130 of FIG. 1 ).
  • the first electronic device 101 and the second electronic device 215 may generate a one-time encryption key using the shared decryption key, that is, the same decryption key.
  • the first electronic device 101 and the second electronic device 215 may generate a decryption key and a one-time encryption key corresponding to the decryption key according to a mutually agreed (or set) generation rule.
  • the one-time encryption key and the key corresponding to the decryption key of the same index generated by the first electronic device 101 and the second electronic device 215 may be the same.
  • the 20th one-time encryption key corresponding to the 20th decryption key generated by the first electronic device 101 and the second electronic device 215 may be the same.
  • the first electronic device 101 may selectively or periodically broadcast the one-time encryption information.
  • the one-time encryption information may include the one-time encryption key.
  • the first electronic device 101 may broadcast the one-time encryption information periodically (eg, 10 minutes, 30 minutes, 1 hour).
  • the set condition is that the first electronic device 101 is switched to the lost mode, or the first electronic device 101 is in another device (eg, the first user device 211 or the second user device) for a certain period of time. (213) or the second electronic device 215), or the first electronic device 101 is not connected to the network.
  • the first electronic device 101 may broadcast the one-time encryption information periodically (eg, 10 minutes, 30 minutes, 1 hour, 1 day, 1 week) regardless of a set condition.
  • the one-time encryption information may include a hash value of the one-time encryption key.
  • the first electronic device 101 may broadcast the one-time encryption key after broadcasting the hash value of the one-time encryption key.
  • the first electronic device 101 may broadcast one-time encryption information through wireless communication (eg, Bluetooth low energy (BLE)).
  • the one-time encryption information may be included in a generic attribute profile (GATT) of a beacon signal and extended advertising.
  • GATT generic attribute profile
  • the beacon signal may be broadcast to an unspecified number of people within a range in which a receiver is not determined and the signal can be received.
  • various methods other than the described method may be used. This is only an example to help the understanding of the invention, but does not limit the content of the invention.
  • the peripheral device 230 may mean an electronic device that receives the one-time encryption information from the first electronic device 101 .
  • the peripheral device 230 may include the user device 210 or a third party electronic device unrelated to the user of the user device 210 .
  • the peripheral device 230 may be an electronic device directly connectable to the location service server 250 (eg, the server 108 of FIG. 1 ).
  • the peripheral device 230 may include a first peripheral device 231 or a second peripheral device 233 . Since the first electronic device 101 periodically transmits the information, the location of the first peripheral device 231 or the second peripheral device 233 may be the same or different from each other.
  • the first peripheral device 231 may receive the one-time encryption information at a first location
  • the second peripheral device 233 may receive the one-time encryption information at a second location.
  • the one-time encryption information received from the first peripheral device 231 and the one-time encryption information received from the second peripheral device 233 may be the same or different.
  • the first peripheral device 231 performs the fifteenth one-time encryption from the first electronic device 101 at the first location.
  • the one-time encryption information including the key may be received, and the second peripheral device 233 may receive the one-time encryption information including the 16th one-time encryption key from the first electronic device 101 at the second location.
  • the peripheral device 230 may identify (or acquire) location information.
  • the location information includes geographic location information (eg, latitude coordinates, longitude coordinates) measured by a location measurement module (eg, GPS) included in the peripheral device 230, a first electronic device through ultra wideband (UWB) communication ( 101 ) and the peripheral device 230 , at least one of distance information, short-range access information (eg, WiFi access point (AP) information), or cellular access information (eg, cellular access).
  • the peripheral device 230 may encrypt the location information using the one-time encryption information.
  • the peripheral device 230 may encrypt the location information using the one-time encryption key included in the one-time encryption information.
  • the peripheral device 230 may transmit the one-time encrypted information and the encrypted location information to the location service server 250 .
  • the first peripheral device 231 may encrypt the location information of the first peripheral device 231 using the 15th one-time encryption key received at the first location.
  • the first peripheral device 231 may transmit the fifteenth one-time encryption information and the encrypted location information of the first peripheral device 231 to the location service server 250 .
  • the second peripheral device 233 may encrypt the location information of the second peripheral device 233 using the 16th one-time encryption key received at the second location.
  • the second peripheral device 233 may transmit the 16th one-time encryption information and the encrypted location information of the second peripheral device 233 to the location service server 250 .
  • the location service server 250 may store the one-time encrypted information received from the peripheral device 230 and the encrypted location information in a database.
  • the location service server 250 may store the one-time encryption information and the encrypted location information in the order of time in which the location information is received.
  • the location service server 250 may search the database for one-time encryption information corresponding to the received one-time encryption information.
  • the location service server 250 may transmit the stored location information corresponding to the searched one-time encryption information to the second electronic device 215 .
  • the location information transmitted to the second electronic device 215 may be encrypted location information of the peripheral device 230 .
  • the location service server 250 may transmit one-time encryption information corresponding to the searched location information to the second electronic device 215 .
  • the location service server 250 may transmit location information stored in response to the searched one-time encryption information or index information of the searched one-time encryption information to the second electronic device 215 .
  • the second electronic device 215 generates a one-time encryption key every set period (eg, 10 minutes, 30 minutes, 1 hour, 1 day, 1 week) using the decryption key shared with the first electronic device 101 .
  • the second electronic device 215 may generate a decryption key and a one-time encryption key corresponding to the decryption key according to an agreed (or identical) generation rule with the first electronic device 101 .
  • the second electronic device 215 generates a first one-time encryption key in response to the first decryption key, and generates a new decryption key (eg, a second decryption key) as a hash value for the first decryption key.
  • the second electronic device 215 may obtain a one-time encryption key based on a user request (eg, a location search request). The second electronic device 215 may generate a one-time encryption key every set period from the time the decryption key is shared with the first electronic device 101 and store it in the memory. Alternatively, in response to a user request, the second electronic device 215 may generate a one-time encryption key from a time when the decryption key is shared using the shared decryption key to a time when the user request is received.
  • the second electronic device 215 when there is a user's request, performs a one-time encryption key and an index corresponding to the one-time encryption key from the time the decryption key is shared using the shared decryption key to the time when the user request is received. can create Alternatively, the second electronic device 215 may generate a hash value of the one-time encryption key by using the shared decryption key.
  • the second electronic device 215 may transmit the one-time encryption information to the location service server 250 .
  • the second electronic device 215 may transmit the one-time encryption information and index information corresponding to the one-time encryption information to the location service server 250 .
  • the one-time encryption information may include all one-time encryption keys or hash values generated from the time the decryption key is shared to the time when a user request is received.
  • the second electronic device 215 may decrypt (eg, decrypt) the encrypted location information using a decryption key.
  • the second electronic device 215 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information generated from the time the decryption key is shared to the time when the user request is received.
  • the second electronic device 215 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information received from the location service server 250 .
  • the second electronic device 215 may decrypt the encrypted location information with a decryption key corresponding to the index information.
  • the second electronic device 215 may provide the decoded location information.
  • the second electronic device 215 may provide a user interface composed of at least one of text, an image, and a video as the location information.
  • the second electronic device 215 may provide an address indicating a geographical location or provide coordinates or a chronological movement route on a map as location information.
  • the second electronic device 215 receives the location information from the location service server 250 in the drawing
  • the first user device 211 or the second user device 213 included in the user device 210 also Since the decryption key is shared, the first user device 211 or the second user device 213 may perform an operation performed by the second electronic device 215 on behalf of the second electronic device 215 .
  • 2B is a diagram illustrating a second network environment 270 between an electronic device, a nearby electronic device, and a server according to various embodiments of the present disclosure.
  • the first electronic device 101 and the second electronic device 215 may share a decryption key.
  • the decryption key may be generated by the first electronic device 101 or the second electronic device 215 .
  • the first electronic device 101 may generate a one-time encryption key corresponding to the decryption key or a hash value of the one-time encryption key every set period.
  • the first electronic device 101 may selectively or periodically broadcast the one-time encryption information.
  • the one-time encryption information may include the one-time encryption key.
  • the one-time encryption information may include a hash value of the one-time encryption key.
  • the first electronic device 101 may broadcast the hash value of the one-time encryption key and separately broadcast the one-time encryption key.
  • the peripheral device 230 may receive the one-time encryption information from the first electronic device 101 .
  • the peripheral device 230 may include the user device 210 or a third party electronic device unrelated to the user of the user device 210 . Since the first electronic device 101 periodically broadcasts the one-time encryption information to an unspecified number, there may be more than one peripheral device 230 receiving the one-time encryption information.
  • the peripheral device 230 may include a first peripheral device 231 , a second peripheral device 233 , or a third peripheral device 235 .
  • the first peripheral device 231 , the second peripheral device 233 , or the third peripheral device 235 may have the same location or different locations.
  • the first peripheral device 231 may receive the one-time encryption information at a first location
  • the second peripheral device 233 receives the one-time encryption information at a second location
  • a third peripheral device 235 may receive the one-time information at the third location.
  • the one-time encryption information received from the first peripheral device 231 , the second peripheral device 233 , or the third peripheral device 235 may be the same or different. For example, when the first electronic device 101 moves from the first location to the third location in chronological order, the first peripheral device 231 performs the tenth one-time encryption from the first electronic device 101 at the first location. You can receive the tenth one-time encryption information including the key.
  • the second peripheral device 233 may receive the thirteenth one-time encryption information including the thirteenth one-time encryption key from the first electronic device 101 at the second location.
  • the third peripheral device 235 may receive the twentieth one-time encryption information including the twentieth one-time encryption key from the first electronic device 101 at the third location.
  • the peripheral device 230 may identify (or acquire) location information.
  • the location information may include geographic location information or information indicating a location using information obtained in various ways (eg, AP SSID (access point service set identifier), base station information).
  • the peripheral device 230 may encrypt the location information using the one-time encryption information.
  • the peripheral device 230 may encrypt the location information using the one-time encryption key included in the one-time encryption information.
  • the peripheral device 230 may transmit the one-time encrypted information and the encrypted location information to the location service server 250 .
  • the peripheral device 230 may transmit the location information without identifying the peripheral device 230 (eg, a device identifier).
  • the first peripheral device 231 may encrypt the location information of the first peripheral device 231 using the tenth one-time encryption information received at the first location.
  • the first peripheral device 231 may transmit the tenth one-time encryption information and the encrypted location information of the first peripheral device 231 to the location service server 250 .
  • the second peripheral device 233 may encrypt the location information of the second peripheral device 233 using the thirteenth one-time encryption information received at the second location.
  • the second peripheral device 233 may transmit the thirteenth one-time encryption information and the encrypted location information of the second peripheral device 233 to the location service server 250 .
  • the third peripheral device 235 may encrypt the location information of the third peripheral device 235 using the twentieth one-time encryption information received at the third location.
  • the third peripheral device 235 may transmit the twentieth one-time encryption information and the encrypted location information of the third peripheral device 235 to the location service server 250 .
  • the location service server 250 may store the one-time encrypted information received from the peripheral device 230 and the encrypted location information in a database.
  • the location service server 250 may search the database for one-time encryption information corresponding to the received one-time encryption information.
  • the location service server 250 may transmit (encrypted) location information stored in response to the searched one-time encryption information to the second electronic device 215 .
  • the location service server 250 searches the database for one-time encryption information corresponding to the received one-time encryption information. can
  • the location service server 250 may transmit location information stored in response to the retrieved one-time encryption information or index information corresponding to the searched one-time encryption information to the second electronic device 215 .
  • the location service server 250 may further store time information at which the encrypted location information is received, and transmit one-time encrypted information or time information corresponding to the encrypted location information to the second electronic device 215 .
  • time information at which the encrypted location information is received
  • time information at which the encrypted location information is received
  • the location service server 250 may transmit one or more pieces of location information to the second electronic device 215 together with at least one of corresponding one-time encryption information, time information, and index information.
  • the second electronic device 215 may obtain the one-time encryption information based on the user's location search request.
  • the one-time encryption information may include a one-time encryption key.
  • the second electronic device 215 may execute a location finding application based on a user input and receive a location finding request from the user through the application.
  • the second electronic device 215 may acquire the one-time encryption information from the time the decryption key is shared to the time when the location search request is received.
  • a shared decryption key eg, a private key
  • twenty one-time encryption information can be obtained.
  • the second electronic device 215 may transmit all the acquired one-time encryption information to the location service server 250 .
  • the second electronic device 215 may transmit all the acquired one-time encryption information and index information corresponding to the one-time encryption key to the location service server 250 .
  • the second electronic device 215 may decrypt (eg, decrypt) the encrypted location information using a decryption key.
  • the second electronic device 215 receives the encrypted location information and the index information from the location service server 250, the second electronic device 215 decrypts the encrypted location information using a decryption key corresponding to the received index information (eg, a password). can be turned off).
  • the second electronic device 215 may receive three pieces of encrypted location information from the location service server 250 . Alternatively, the second electronic device 215 may receive three pieces of one-time encryption information or three pieces of index information corresponding to three pieces of encrypted location information. Alternatively, the second electronic device 215 may receive three pieces of one-time encryption information or three pieces of time information corresponding to three pieces of encrypted location information. The second electronic device 215 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information. The second electronic device 215 may decode the location information based on the received index information or time information at which the location information is received.
  • the index of the one-time encryption key may be the same as the index of the decryption key.
  • the index of the decryption key may indicate time information.
  • the first decryption key is created and shared at the first time (2020-01-01, 01:00), and the second decryption key is the second time (2020) after a certain time (eg, 1 hour) after the first time. -01-01, 02:00), and the third decryption key may be generated at a third time (03:00) after a predetermined time has passed since the second time.
  • location information of the first peripheral device 231 encrypted with the tenth one-time encryption key may be decrypted with the tenth decryption key.
  • location information of the second peripheral device 233 encrypted with the thirteenth one-time encryption key may be decrypted with the thirteenth decryption key.
  • the location information of the third peripheral device 235 encrypted with the twentieth one-time encryption key may be decrypted with the twentieth decryption key.
  • the location information (eg, the first location) of the first peripheral device 231 decrypted with the tenth decryption key is from the tenth time (2020-01-01, 10:00) to the eleventh time (2020-01-01, 11). : 00) may indicate information on which the first electronic device 101 is located.
  • the location information (eg, the second location) of the second peripheral device 233 decrypted with the 13th decryption key is from the 13th time (2020-01-01, 13:00) to the 14th time (2020-01-01, 14 : 00) may indicate information on which the first electronic device 101 is located.
  • the location information (eg, the third location) of the third peripheral device 235 decrypted with the 20th decryption key is from the 20th time (2020-01-01, 20:00) to the 21st time (2020-01-01, 21 : 00) may indicate information on which the first electronic device 101 is located.
  • the second electronic device 215 may decrypt the location information with a decryption key corresponding to the index information received from the location service server 250 .
  • the second electronic device 215 may provide location information of the first electronic device 101 according to time. For example, the second electronic device 215 may mark the movement path of the first electronic device 101 on the map. On the map, on January 1, 2020, between 10:00 and 11:00, the first electronic device 101 is in the first position, and on January 1, 2020, between 13:00 and 14:00 ( 101) exists at the second location, and the first electronic device 101 exists at the third location between 20:00 and 21:00 on January 1, 2020, and the movement path of the first electronic device 101 is can be marked.
  • An electronic device (eg, the electronic device 101 of FIG. 1 ) according to various embodiments includes a communication module (eg, the communication module 190 of FIG. 1 ), a memory (eg, the memory 130 of FIG. 1 ), and and a processor (eg, the processor 120 of FIG. 1 ) operatively connected to the communication module or the memory, wherein the processor receives one-time encryption information from another electronic device through the communication module, and the communication module to obtain the location information of the electronic device using the , encrypt the location information based on the one-time encryption information, and transmit the encrypted location information and the one-time encryption information to a server.
  • a communication module eg, the communication module 190 of FIG. 1
  • a memory eg, the memory 130 of FIG. 1
  • a processor eg, the processor 120 of FIG. 1
  • the processor may be configured to determine whether to obtain the location information by analyzing the information.
  • the processor may be configured to obtain the location information when information provision for the one-time encryption information is permitted, and to ignore the one-time encryption information when information provision for the one-time encryption information is not permitted.
  • the processor may be configured to notify the user of reception of the one-time encryption information when the provision of information on the one-time encryption information is not allowed, and to obtain the location information based on a user input.
  • the processor may be configured to obtain the location information when the user input is a transmission agreement, and ignore the one-time encryption information when the user input is not a transmission agreement.
  • the processor may be configured not to store the encrypted location information and the one-time encrypted information in the memory after transmitting the encrypted information to the server.
  • the processor may be configured to perform an operation performed according to the reception of the one-time encryption information in the background of the electronic device.
  • An electronic device (eg, the electronic device 101 of FIG. 1 ) according to various embodiments includes a communication module (eg, the communication module 190 of FIG. 1 ), a memory (eg, the memory 130 of FIG. 1 ), and and a processor (eg, the processor 120 of FIG. 1 ) operatively connected to the communication module or the memory, wherein the processor receives a user input requesting a location of another electronic device, and communicates with the other electronic device. to obtain one-time encryption information based on the shared decryption key, transmit the one-time encryption information to a server using the communication module, and receive location information of a peripheral device corresponding to the location of the other electronic device from the server can be set.
  • a communication module eg, the communication module 190 of FIG. 1
  • a memory eg, the memory 130 of FIG. 1
  • a processor eg, the processor 120 of FIG. 1
  • the processor generates one-time encryption information or index information corresponding to the one-time encryption information every set period based on a decryption key shared with the other electronic device, and stores the generated one-time encryption information or the index information in the memory. It can be set to be stored in a secure area.
  • the processor may be configured to, upon receiving the user input, generate one-time encryption information or index information corresponding to the one-time encryption information from the time the decryption key is shared to the time when the user input is received.
  • the processor may be configured to transmit all one-time encryption information or index information acquired from the time the decryption key is shared to the time when the user input is received to the server.
  • the processor may be configured to decrypt the location information of the peripheral device using a decryption key corresponding to the one-time encryption information, and provide the decrypted location information.
  • the processor receives the location information and index information of the peripheral device from the server, decrypts the encrypted location information of the peripheral device using a decryption key corresponding to the received index information, and the decrypted location information can be set to provide.
  • the processor may be configured to provide a movement path of the other electronic device by using the decoded location information according to time when there are a plurality of pieces of the decrypted location information.
  • FIG. 3 is a flowchart 300 illustrating an operation method between an electronic device, a nearby electronic device, and a server according to various embodiments of the present disclosure.
  • the first electronic device may share a decryption key with the second electronic device 215 .
  • the decryption key may be generated and shared by the first electronic device 101 or the second electronic device 215 . Sharing the decryption key may be for tracking the location of the first electronic device 101 using the second electronic device 215 .
  • the first electronic device 101 or the second electronic device 215 may be a device on which a location finding application can be installed.
  • the first electronic device 101 may generate a one-time encryption key every set period using the shared decryption key.
  • the first electronic device 101 or the second electronic device 215 may generate a hash value of the one-time encryption key every set period using the decryption key.
  • the first electronic device 101 may generate the first one-time encryption key by using the shared first decryption key.
  • the first electronic device 101 may generate a decryption key and a one-time encryption key corresponding to the decryption key according to a generation rule agreed with the second electronic device 215 after a predetermined time has elapsed.
  • the first electronic device 101 may generate a second decryption key using a hash value of the first decryption key after a predetermined time has elapsed.
  • the first electronic device 101 may generate a second one-time encryption key based on the second decryption key.
  • Information encrypted with the one-time encryption key may be decrypted (eg, decrypted) using the decryption key.
  • the first electronic device 101 stores at least one of the generated decryption key, the hash value of the decryption key, the one-time encryption key, or the hash value of the one-time encryption key in a memory (eg, the memory 130 of FIG. 1 ).
  • the first electronic device 101 stores the generated encryption key, the hash value of the decryption key, the one-time encryption key, or the one-time encryption in a secure area (eg, trust zone, secure world, trusted execution environment) of the memory 130 . At least one of the hash values of the key can be stored.
  • a secure area eg, trust zone, secure world, trusted execution environment
  • the first electronic device 101 may broadcast the one-time encryption information.
  • the first electronic device 101 may selectively or periodically broadcast the one-time encryption information.
  • the one-time encryption information may include the one-time encryption key.
  • the first electronic device 101 may broadcast the one-time encryption information periodically (eg, 10 minutes, 30 minutes, 1 hour).
  • the set condition is that the first electronic device 101 is switched to the lost mode, or the first electronic device 101 is in another device (eg, the first user device 211 or the second user device) for a certain period of time. (213) or the second electronic device 215), or the first electronic device 101 is not connected to the network.
  • the first electronic device 101 may broadcast the one-time encryption information periodically (eg, 10 minutes, 30 minutes, 1 hour, 1 day, 1 week) regardless of a set condition.
  • the one-time encryption information may be a packet (or signal) transmitted to an unspecified number existing in a signal receivable range (eg, 5m, 10m).
  • the one-time encryption information may include a hash value of the one-time encryption key.
  • the first electronic device 101 may broadcast the hash value of the one-time encryption key and separately broadcast the one-time encryption key.
  • the peripheral device 230 may identify location information.
  • the peripheral device 230 may receive the one-time encryption information.
  • Peripheral device 230 may selectively scan packets (or signals) periodically, or in real time. The packet scan may mean receiving information (or data) such as an advertisement packet or a beacon signal from an unspecified number existing in a receivable range. Since the one-time encryption information is a packet whose recipient is not determined, the peripheral device 230 may receive the one-time encryption information by scanning the packet. The peripheral device 230 may receive and analyze the information. When the received packet is for a connection (eg, pairing) request, the peripheral device 230 may perform a connection process. The peripheral device 230 may identify the location information when the received packet includes the one-time encryption information.
  • a connection eg, pairing
  • the location information may include geographic location information of the peripheral device 230 or various information that may indirectly indicate the location of the peripheral device 230 .
  • the location information includes geographic location information (eg, latitude coordinates, longitude coordinates) measured by a location measurement module (eg, GPS) included in the peripheral device 230 , the first electronic device (eg, through UWB communication) 101 ) and at least one of distance information, short-range access information (eg, AP SSID), or cellular access information (eg, cellular access) between the peripheral device 230 .
  • a location measurement module eg, GPS
  • AP SSID short-range access information
  • cellular access information eg, cellular access
  • peripheral device 231 When there are a plurality of peripheral devices 230 , location information of the peripheral devices 230 may be different.
  • the peripheral device 230 may encrypt the location information using the one-time encryption information.
  • the peripheral device 230 may encrypt the location information using the one-time encryption key included in the one-time encryption information. Since the location information is location information of the peripheral device 230 unrelated to the first electronic device 101 , it may be used only for the purpose of finding the first electronic device 101 . To this end, the location information of the peripheral device 230 may be encrypted by the one-time encryption information generated by the first electronic device 101 .
  • the peripheral device 230 may transmit the one-time encrypted information and the encrypted location information to the location service server 250 . Since the peripheral device 230 is an electronic device of a third party unrelated to the user device 210 or the first electronic device 101, information of the peripheral device 230 that transmits location information may need to be protected. To this end, when transmitting the location information, the peripheral device 230 may transmit the encrypted location information without any information (eg, a device identifier) that can identify the peripheral device 230 . After transmitting the information, the peripheral device 230 may delete (or remove) the one-time encryption information without storing it.
  • the peripheral device 230 may transmit the encrypted location information without any information (eg, a device identifier) that can identify the peripheral device 230 .
  • the peripheral device 230 may delete (or remove) the one-time encryption information without storing it.
  • server 250 receives the one-time encrypted information and the encrypted location from peripheral device 230 .
  • Information can be received and stored.
  • the location service server 250 may store the one-time encrypted information and the encrypted location information in a database.
  • the location service server 250 may store the one-time encrypted information and the encrypted location information in a secure area of a database.
  • the location service server 250 may store the one-time encrypted information and the encrypted location information in an order of time in which the information is received.
  • the second electronic device 215 may be requested to find a location.
  • the location finding request may be executing a location finding application based on a user input and receiving a location finding selection from the user through the application.
  • the second electronic device 215 may obtain one-time encryption information.
  • the second electronic device 215 generates a one-time encryption key every set period (eg, 10 minutes, 30 minutes, 1 hour, 1 day, 1 week) using the decryption key shared with the first electronic device 101 .
  • the second electronic device 215 may generate a decryption key and a one-time encryption key corresponding to the decryption key according to an agreed (or identical) generation rule with the first electronic device 101 .
  • the second electronic device 215 may generate a one-time encryption key every set period from the time the decryption key is shared with the first electronic device 101 and store it in a memory (eg, the memory 130 of FIG. 1 ).
  • the second electronic device 215 may store the decryption key and the one-time encryption key corresponding to the decryption key in the secure area of the memory.
  • the second electronic device 215 may further store at least one of the hash value of the decryption key, the hash value of the one-time encryption key, or index information corresponding to the decryption key (or the one-time encryption key) in the secure area of the memory. have.
  • the second electronic device 215 may generate a one-time encryption key from the point in time when the decryption key is shared using the shared decryption key to the point in time when the location search is requested.
  • the second electronic device 215 may generate a hash value of the one-time encryption key by using the shared decryption key.
  • the second electronic device 215 may obtain the one-time encryption information by extracting the one-time encryption information stored in the memory or generating the one-time encryption information at the time when the location search is requested.
  • the second electronic device 215 may transmit the one-time encryption information to the location service server 250 .
  • the one-time encryption information may include a one-time encryption key.
  • the obtained one-time encryption key may include all one-time encryption keys generated from the time the decryption key is shared to the time when a user request is received.
  • the second electronic device 215 may transmit the one-time encryption information and index information corresponding to the one-time encryption information to the location service server 250 .
  • the second electronic device 215 may include a hash value of the one-time encryption key instead of the one-time encryption key as the one-time encryption information and transmit it to the location service server 250 .
  • the location services server 250 may retrieve location information.
  • the location service server 250 may search the database for one-time encryption information corresponding to the received one-time encryption information.
  • the location service server 250 may transmit the stored location information in response to the retrieved one-time encryption information to the second electronic device 215. have.
  • the location information transmitted to the second electronic device 215 may be encrypted location information.
  • the location service server 250 may transmit one-time encryption information corresponding to the searched location information to the second electronic device 215 .
  • the location service server 250 may transmit index information of the one-time encryption information corresponding to the searched location information to the second electronic device 215 .
  • the second electronic device 215 may receive and decode location information from the location service server 250 .
  • the second electronic device 215 may decrypt (eg, decrypt) the encrypted location information using the decryption key stored in the memory.
  • the second electronic device 215 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information generated from the time the decryption key is shared to the time when the user request is received.
  • the second electronic device 215 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information received from the location service server 250 .
  • the second electronic device 215 may decrypt the encrypted location information using the index information corresponding to the one-time encryption information received from the location service server 250 and the first shared decryption key.
  • the second electronic device 215 may decrypt the encrypted location information using a decryption key corresponding to the index information.
  • the second electronic device 215 may provide the decoded location information.
  • the second electronic device 215 may provide a user interface composed of at least one of text, an image, and a video as the location information.
  • the second electronic device 215 may provide an address indicating a geographical location or provide coordinates or a chronological movement route on a map as location information.
  • FIG. 4 is a flowchart 400 illustrating a method of operating an electronic device of a user according to various embodiments of the present disclosure.
  • a processor eg, the processor 120 of FIG. 1 of the electronic device (eg, the electronic device 101 of FIG. 1 ) according to various embodiments generates a decryption key. and can be shared.
  • the processor 120 may share the generated decryption key with devices included in the user device (eg, the user device 210 of FIG. 2A ).
  • the user device 210 is a device owned by the user or another user (eg, family member, friend) associated with the user, for example, a smart phone, a laptop computer, a desktop computer, a wireless earphone, a Bluetooth speaker, a wearable device, a car key.
  • the processor 120 may transmit the decryption key to the user device 210 through a communication module (eg, the communication module 190 of FIG. 1 ).
  • the key shared with the user devices may be equally generated in the user devices by receiving a seed value input from the user.
  • the processor 120 may generate one-time encryption information based on the decryption key every set period.
  • the one-time encryption information may include a one-time encryption key.
  • the processor 120 may generate a one-time encryption key every set period (eg, 1 hour, 24 hours, 3 days, 1 week) using the decryption key.
  • the first electronic device 101 may generate a hash value of the one-time encryption key every set period by using the decryption key.
  • the processor 120 may store a decryption key and a one-time encryption key (eg, encryption pair information ⁇ public key & private key) corresponding to the decryption key in a memory (eg, the memory 130 of FIG. 1 ).
  • the processor 120 may store the encryption pair information in a secure area of the memory 130 .
  • the processor 120 may delete (or remove) the encryption pair information from the memory 130 after a predetermined time has elapsed in consideration of the storage space of the memory 130 .
  • the processor 120 may set the predetermined time in consideration of a period for generating the one-time encryption information.
  • the processor 120 may delete the encryption pair information after a predetermined time (eg, 7 days) has elapsed from the memory 130 .
  • the processor 120 may delete the encryption pair information after a predetermined time (eg, 30 days) has elapsed from the memory 130 .
  • the processor 120 may determine whether a set condition is met.
  • the set condition is that the electronic device 101 is switched to the lost mode or the electronic device 101 is in another device (eg, the first user device 211 , the second user device 213 , or the second electronic device 101 ) for a certain period of time. device 215) or the electronic device 101 is not connected to a network.
  • the processor may perform operation 407 if the set condition is met, and may return to operation 403 if it does not correspond to the set condition.
  • the processor 120 may broadcast the one-time encryption information.
  • the processor 120 may transmit the one-time encryption information through the communication module 190 (eg, BLE).
  • the processor 120 may transmit the one-time encryption information in the form of a packet to an unspecified number existing in a signal receivable range (eg, 5m, 10m).
  • a method of transmitting the one-time encryption information various methods other than the described method may be used.
  • the processor 120 may selectively or periodically broadcast the one-time encryption information.
  • the processor 120 may broadcast the one-time encryption information periodically (eg, 10 minutes, 30 minutes, 1 hour) regardless of a set condition. In this case, operation 405 may be omitted.
  • the one-time encryption information may include a hash value of the one-time encryption key.
  • the processor 120 may broadcast the one-time encryption key after broadcasting the hash value of the one-time encryption key.
  • FIG. 5 is a flowchart 500 illustrating a method of operating a peripheral electronic device according to various embodiments of the present disclosure.
  • FIG. 5 illustrates an operation method of the peripheral device 230 shown in FIG. 2A or 2B.
  • the peripheral device 230 is interpreted as the electronic device 101 of FIG. 1
  • the first electronic device 101 is It may be interpreted as the electronic device 102 or the electronic device 104 of FIG. 1 .
  • the processor (eg, the processor 120 of FIG. 1 ) of the electronic device (eg, the electronic device 101 of FIG. 1 ) according to various embodiments is configured with a communication module (eg, the processor 120 of FIG. 1 ).
  • a communication module eg, the processor 120 of FIG. 1
  • the one-time encryption information may be received from an electronic device capable of generating a one-time encryption key using a shared decryption key.
  • the electronic device may include a first user device 211 , a second user device 213 , or a second electronic device 215 included in the user device 210 of FIG. 2A .
  • the one-time encryption information may include a one-time encryption key generated by the electronic device.
  • the processor 120 may separately receive the one-time encryption key after receiving the hash value of the one-time encryption key. .
  • the processor 120 may identify location information.
  • the location information may include geographic location information of the electronic device 101 or various information that may indirectly indicate the location of the electronic device 101 .
  • the location information includes geographic location information (eg, latitude coordinates and longitude coordinates) measured through the communication module 190 included in the electronic device 101, the electronic device 102 and the electronic device through UWB communication. It may include at least one of distance information between the devices 101 , short-range access information (eg, AP SSID), or cellular access information (eg, cellular access).
  • short-range access information eg, AP SSID
  • cellular access information eg, cellular access
  • the processor 120 may encrypt the location information.
  • the processor 120 may encrypt the location information using the one-time encryption information.
  • the processor 120 may encrypt the location information with the one-time encryption key.
  • the processor 120 may transmit the one-time encrypted information and the encrypted location information to a server (eg, the location service server 250 of FIG. 2A or FIG. 2B ) through the communication module 190 .
  • the processor 120 may also transmit time information at which the one-time encryption information is received to the location service server 250 . Since the electronic device 101 is another electronic device of the user of the electronic device that has transmitted the one-time encryption information or an electronic device of a third party unrelated to the electronic device, the information of the electronic device 101 that transmits the location information must be protected. can To this end, when transmitting the location information, the processor 120 may transmit the encrypted location information without any information (eg, a device identifier) that can identify the electronic device 101 . After transmitting the location information, the processor 120 may delete (or remove) the one-time encryption information without storing it.
  • a server eg, the location service server 250 of FIG. 2A or FIG. 2B
  • the processor 120 may also transmit time information at which the one-time encryption information is received to the location service
  • FIG. 6 is a flowchart 600 illustrating a method of providing a location of a nearby electronic device according to various embodiments of the present disclosure.
  • FIG. 6 is a more concrete example of the operation method of FIG. 5 .
  • the peripheral device 230 is interpreted as the electronic device 101 of FIG. 1
  • the first electronic device 101 is the electronic device 102 of FIG. 1 .
  • it may be interpreted as the electronic device 104 .
  • the processor eg, the processor 120 of FIG. 1
  • the electronic device eg, the electronic device 101 of FIG. 1
  • a communication module eg, the processor 120 of FIG. 1
  • the one-time encryption information may be received from an electronic device capable of generating a one-time encryption key using a shared decryption key.
  • the one-time encryption information may include a one-time encryption key generated by the electronic device. Since operation 601 is the same as or similar to operation 501 of FIG. 5 , a detailed description thereof may be omitted.
  • the processor 120 may analyze the information (or packet).
  • the one-time encryption information may be received through a packet scan.
  • the packet scan may mean receiving information (or data) such as an advertisement packet or a beacon signal in real time or periodically from an unspecified number existing in a receivable range. Since the one-time encryption information is a packet whose recipient is not determined, the processor 120 may receive the one-time encryption information by scanning the packet. The processor 120 may receive and analyze the packet including the information. The processor 120 may perform different operations according to a received packet.
  • the processor 120 may determine whether the information is a connection request.
  • the processor 120 may perform operation 621 if the information is a connection request, and may perform operation 607 if the information is not a connection request.
  • the processor 120 may perform a connection process.
  • the processor 120 may determine that the packet received by the packet scan is a connection request through the information analysis.
  • the connection process may mean performing an operation for connecting with the counterpart electronic device that has transmitted the packet.
  • the connection process may include transmitting a response packet to the counterpart electronic device that has transmitted the packet, and connecting with the counterpart electronic device when the connection is permitted by the counterpart electronic device receiving the response packet .
  • the processor 120 may include device information (eg, a device identifier, a device profile, etc.) of the electronic device 101 in the response packet and transmit it.
  • the processor 120 may determine whether to subscribe (or allow) the service. Whether to subscribe to the service may be whether to allow location information to be provided by the location finding service.
  • the location finding service may be to help track the location of another electronic device by encrypting its own location information (eg, location information of the electronic device 101) and transmitting it to the server.
  • the location finding service may encrypt and transmit only its own location information, and may not expose any information about its own electronic device. However, the location finding service may or may not be permitted according to the user's settings.
  • operation 609 may be performed, and if not subscribed to the service (eg, information provision is not permitted), operation 631 may be performed. Operation 607 may be performed only the first time when the information is not a connection request. Operation 607 may be omitted.
  • the processor 120 may identify location information.
  • the location information may include geographic location information of the electronic device 101 or various information that may indirectly indicate the location of the electronic device 101 .
  • the location information includes geographic location information (eg, latitude coordinates and longitude coordinates) measured through the communication module 190 included in the electronic device 101, the electronic device 102 and the electronic device through UWB communication. It may include at least one of distance information between the devices 101 , short-range access information (eg, AP SSID), or cellular access information (eg, cellular access).
  • the processor 120 may encrypt the location information.
  • the processor 120 may encrypt the location information using the one-time encryption information.
  • the processor 120 may encrypt the location information with the one-time encryption key.
  • the processor 120 may transmit the one-time encrypted information and the encrypted location information to a server (eg, the location service server 250 of FIG. 2A or FIG. 2B ) through the communication module 190 .
  • the processor 120 may also transmit time information at which the one-time encryption information is received to the location service server 250 .
  • the processor 120 may transmit the encrypted location information without any information (eg, a device identifier) that can identify the electronic device 101 .
  • the processor 120 may delete (or remove) the one-time encryption information without storing it.
  • operations 601 to 613 may be operations performed in the background of the electronic device 101 .
  • the processor 120 may perform operations 601 to 613 without a user notification.
  • the processor 120 may notify the user of the performance of operations 601 to 613 based on the setting of the electronic device 101 or the setting of the user.
  • the processor 120 may provide a user notification for information reception.
  • the processor 120 may display the one-time encryption information reception through a display (eg, the display device 160 of FIG. 1 ).
  • the user notification may be to inform that the location information is transmitted to the location service server 250 when the user agrees to transmit along with the description of the location service.
  • the user notification may indicate that the received information is ignored and that no information is transmitted to the location service server 250 .
  • the processor 120 may determine whether the transmission is agreed to based on the user input. The processor 120 may perform operation 609 if the transmission is agreed, and may perform an operation 635 if the transmission is not agreed. When the transmission is agreed, the processor 120 may perform operations 609 to 613 . Operation 633 is performed only once for the first time, and thereafter, operations 631 to 635 may be omitted depending on whether or not the transmission is agreed to.
  • the processor 120 may ignore the one-time encryption information.
  • the processor 120 may remove the user notification through the display device 160 and delete (or remove) the one-time encryption information without storing it.
  • the processor 120 may ignore the one-time encryption information. If the processor 120 is not subscribed to the service, the processor 120 may not perform operations 631 to 635 .
  • FIG. 7 is a flowchart 700 illustrating a method of operating an electronic device of a user according to various embodiments of the present disclosure.
  • FIG. 7 illustrates an operation method of the second electronic device 215 shown in FIG. 2A or 2B.
  • the peripheral device 230 may be interpreted as the electronic device 102 or the electronic device 104 of FIG. 1 .
  • the processor 120 of FIG. 1 of the electronic device receives a location finding request.
  • the processor 120 may display an execution screen of the application on a display (eg, the display device 160 of FIG. 1 ) by executing a location finding application based on a user input.
  • the execution screen of the application may include various menu items such as a location search button, an encryption key generation button, and a map view button.
  • the processor 120 may receive a location search request by receiving a location search button selected from the user.
  • the processor 120 may obtain the one-time encryption information.
  • the one-time encryption information may include a one-time encryption key generated by the electronic device.
  • the processor 120 may also generate index information corresponding to the one-time encryption key generated by the electronic device 101 .
  • the electronic device 101 may be an electronic device capable of sharing a decryption key and executing a location finding application.
  • the electronic device 101 is at least one of the first user device 211 , the second user device 213 , and the second electronic device 215 included in the user device 210 of FIG. 2A . may include.
  • the processor 120 may acquire all one-time encryption information from the time the decryption key is shared to the time when the location search request is received.
  • the processor 120 may acquire index information corresponding to all one-time encryption information from the time the decryption key is shared to the time when the location search request is received.
  • the processor 120 may generate one-time encryption information every set period from the time the decryption key is shared and store it in a memory (eg, the memory 130 of FIG. 1 ).
  • the processor 120 may store a decryption key and a one-time encryption key corresponding to the decryption key in the secure area of the memory 130 .
  • the processor 120 provides one-time encryption information and index information corresponding to the one-time encryption information from the time when the decryption key is shared using the shared decryption key to the time when the location search request is received. can create
  • the processor 120 may transmit the one-time encryption information to the location service server 250 through a communication module (eg, the communication module 190 of FIG. 1 ).
  • a communication module eg, the communication module 190 of FIG. 1
  • three one-time encryption pieces of information may be obtained.
  • the processor 120 may transmit all the acquired one-time encryption information or index information corresponding to the one-time encryption information to the location service server 250 .
  • the processor 120 may receive encrypted location information from the location service server 250 through the communication module 190 .
  • the encrypted location information may indicate location information of a peripheral device (eg, the electronic device 102 of FIG. 1 , the electronic device 104 of FIG. 1 , or the peripheral device 230 of FIGS. 2A and 2B ).
  • the encrypted location information may be encrypted using a one-time encryption key.
  • the processor 120 may receive the one-time encrypted information from the location service server 250 together with the encrypted location information.
  • the processor 120 may receive, from the location service server 250 , one-time encrypted information and index information corresponding to the one-time encrypted information along with the encrypted location information.
  • the processor 120 may decode and provide the location information.
  • the processor 120 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information generated from the time the decryption key is shared to the time when the location search request is received.
  • the processor 120 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information received from the location service server 250 .
  • the processor 120 may decrypt the encrypted location information with a decryption key corresponding to the index information received from the location service server 250 .
  • the processor 120 may provide the decoded location information.
  • the processor 120 may provide a user interface composed of at least one of text, an image, and a video as the location information.
  • the processor 120 may provide an address indicating a geographic location or provide coordinates or a chronological movement route on a map as location information.
  • FIG. 8 is a flowchart 800 illustrating a method of providing a location of a user's electronic device according to various embodiments of the present disclosure.
  • FIG. 8 is a more detailed example of the operation method of FIG. 7 .
  • the first electronic device is the electronic device 102 or It may be interpreted as the electronic device 104 .
  • the processor 120 of FIG. 1 of the electronic device receives a decryption key. can be saved.
  • the processor 120 receives the decryption key from the electronic device (eg, the electronic device 102 or the electronic device 104 of FIG. 1 ) that has generated the decryption key through a communication module (eg, the communication module 190 of FIG. 1 ).
  • a communication module eg, the communication module 190 of FIG. 1
  • the processor 120 may generate the same as the electronic device (eg, the electronic device 102 or the electronic device 104 of FIG. 1 ) using the common seed value input by the user.
  • the processor 120 may store the received or identically generated decryption key in a secure area of a memory (eg, the memory 130 of FIG. 1 ).
  • the processor 120 may generate the decryption key and share it with devices included in a user device (eg, the user device 210 of FIG. 2A ).
  • the user device 210 is a device owned by the user or another user (eg, family member, friend) associated with the user, for example, a smart phone, a laptop computer, a desktop computer, a wireless earphone, a Bluetooth speaker, a wearable device, a car key. It may include various types of electronic devices such as
  • the processor 120 may transmit the decryption key to the user device 210 through the communication module 190 .
  • the processor 120 may receive a locating request.
  • the processor 120 may execute a location finding application based on a user input and receive a location finding request from the user through the executed application. Since operation 803 is the same as or similar to operation 701 of FIG. 7 , a detailed description thereof may be omitted.
  • the processor 120 may determine (or identify) whether the one-time encryption information is stored.
  • the processor 120 may determine whether one-time encryption information and index information corresponding to the one-time encryption information are stored.
  • the one-time encryption information may include a one-time encryption key generated by the electronic device.
  • the processor 120 performs operation 807 when the one-time encryption information is stored in a memory (eg, the memory 130 of FIG. 1 ), and performs operation 821 when the one-time encryption information is not stored. can be performed.
  • Operation 821 may include generating index information corresponding to the one-time encryption information.
  • the processor 120 may extract the one-time encryption information from the memory 130 .
  • the processor 120 may generate one-time encryption information every set period from the time the decryption key is shared and store it in the secure area of the memory 130 .
  • the processor 120 in the security area of the memory 130 at least one of a decryption key, a hash value of the decryption key, a one-time encryption key corresponding to the encryption key, a hash value of the one-time encryption key, or index information corresponding to the one-time encryption key can be saved.
  • the processor 120 may extract the one-time encryption information or the index information from the security area of the memory 130 .
  • the processor 120 If the one-time encryption information is not stored, in operation 821, the processor 120 generates one-time encryption information from the time when the decryption key is shared using the shared decryption key to the time when the location finding request is received. can The processor 120 may acquire all one-time encryption information from the time the decryption key is shared to the time when the location search request is received. The processor 120 may acquire all one-time encryption information from the time the decryption key is shared to the time the location search request is received, and index information corresponding to all the one-time encryption information.
  • the processor 120 may transmit the one-time encryption information to the location services server 250 via the communication module 190 .
  • the set period is 1 hour, and when 6 hours have elapsed from the time the decryption key is shared at the time of requesting the location search, 6 pieces of one-time encryption information may be obtained.
  • the processor 120 may transmit all the acquired one-time encryption information and index information corresponding to all the one-time encryption information to the location service server 250 .
  • the processor 120 may receive encrypted location information from the location service server 250 through the communication module 190 .
  • the encrypted location information may indicate location information of a peripheral device (eg, the peripheral device 230 of FIGS. 2A and 2B ).
  • the encrypted location information may be encrypted using a one-time encryption key.
  • the processor 120 may receive the one-time encryption information or index information corresponding to the one-time encryption information from the location service server 250 together with the encrypted location information.
  • the processor 120 may decode the location information.
  • the processor 120 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information generated from the time the decryption key is shared to the time when the location search request is received.
  • the processor 120 may decrypt the encrypted location information with a decryption key corresponding to the one-time encryption information received from the location service server 250 .
  • the processor 120 may decrypt the encrypted location information with a decryption key corresponding to the index information received from the location service server 250 .
  • the processor 120 may provide the decoded location information.
  • the processor 120 may provide a user interface composed of at least one of text, an image, and a video as the location information.
  • the processor 120 may provide an address indicating a geographic location or provide coordinates or a chronological movement route on a map as location information.
  • the processor 120 may mark the movement path of the electronic device 102 in chronological order on the map. On the map, on January 1, 2020, the electronic device 102 is in the first position between 10:00 and 11:00, and on January 1, 2020, between 11 and 12:00, the electronic device 102 is located It exists in the 2nd position, and the movement path of the electronic device 102 may be marked as being present in the third position between 14:00 and 15:00 on January 1, 2020.
  • the first location or the third location may be location information of the peripheral device 230 .
  • a one-time encryption method is performed from another electronic device through a communication module (eg, the communication module 190 of FIG. 1 ) of the electronic device.
  • a communication module eg, the communication module 190 of FIG. 1
  • an operation of receiving information, an operation of acquiring the location information of the electronic device using the communication module, an operation of encrypting the location information based on the one-time encryption information, and an operation of the encrypted location information and the one-time encryption information It may include an operation to transmit to the server.
  • the method may further include the operation of determining whether to obtain the location information by analyzing the one-time encryption information.
  • the determining includes determining to obtain the location information when information provision for the one-time encryption information is permitted, and ignoring the one-time encryption information when providing information on the one-time encryption information is not permitted. It may include an action to decide to do so.
  • the determining includes an operation of notifying a user of reception of the one-time encryption information when provision of information on the one-time encryption information is not permitted, and an operation of determining to obtain the location information based on a user input can do.
  • the determining may include determining to obtain the location information when the user input is a consent for transmission, and determining to ignore the one-time encryption information when the user input is not a consent for transmission have.
  • the method may further include controlling not to store the encrypted location information and the one-time encryption information in the memory of the electronic device after transmitting the encrypted information to the server.
  • the method may further include controlling an acquisition operation, an encryption operation, or a transmission operation performed according to the reception of the one-time encryption information to be performed in the background of the electronic device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Divers modes de réalisation de la présente invention concernent un procédé et un dispositif comprenant un module de communication, une mémoire, et un processeur connecté fonctionnellement au module de communication ou à la mémoire, le processeur étant configuré pour : recevoir des informations de chiffrement à usage unique provenant d'un autre dispositif électronique par l'intermédiaire du module de communication ; acquérir des informations de position du dispositif électronique à l'aide du module de communication ; chiffrer les informations de localisation sur la base des informations de chiffrement à usage unique ; et transmettre les informations de localisation chiffrées et les informations de chiffrement en une fois à un serveur. Divers modes de réalisation sont possibles.
PCT/KR2020/019076 2020-03-16 2020-12-24 Procédé et dispositif pour fournir une localisation en utilisant un dispositif périphérique WO2021187730A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020200032119A KR20210115807A (ko) 2020-03-16 2020-03-16 주변 장치를 이용한 위치 제공 방법 및 장치
KR10-2020-0032119 2020-03-16

Publications (1)

Publication Number Publication Date
WO2021187730A1 true WO2021187730A1 (fr) 2021-09-23

Family

ID=77771305

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2020/019076 WO2021187730A1 (fr) 2020-03-16 2020-12-24 Procédé et dispositif pour fournir une localisation en utilisant un dispositif périphérique

Country Status (2)

Country Link
KR (1) KR20210115807A (fr)
WO (1) WO2021187730A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001148743A (ja) * 1999-09-07 2001-05-29 Nippon Telegr & Teleph Corp <Ntt> 位置情報サービスシステム、並びに、位置情報サービスシステムにおける位置情報利用方法、発信端末、位置センタ、及び、着信端末
US20120089519A1 (en) * 2010-10-06 2012-04-12 Prasad Peddada System and method for single use transaction signatures
KR20150105709A (ko) * 2014-03-10 2015-09-18 삼성전자주식회사 전자 장치의 분실 방지 방법 및 장치
US20170032370A1 (en) * 2015-07-27 2017-02-02 Mastercard International Incorporated Electronic payment transactions using machine readable code without requiring online connection
WO2018216988A1 (fr) * 2017-05-22 2018-11-29 주식회사 에프엔에스밸류 Système d'authentification de sécurité et procédé d'authentification de sécurité destinés à créer une clé de sécurité par combinaison de facteurs d'authentification de multiples utilisateurs

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001148743A (ja) * 1999-09-07 2001-05-29 Nippon Telegr & Teleph Corp <Ntt> 位置情報サービスシステム、並びに、位置情報サービスシステムにおける位置情報利用方法、発信端末、位置センタ、及び、着信端末
US20120089519A1 (en) * 2010-10-06 2012-04-12 Prasad Peddada System and method for single use transaction signatures
KR20150105709A (ko) * 2014-03-10 2015-09-18 삼성전자주식회사 전자 장치의 분실 방지 방법 및 장치
US20170032370A1 (en) * 2015-07-27 2017-02-02 Mastercard International Incorporated Electronic payment transactions using machine readable code without requiring online connection
WO2018216988A1 (fr) * 2017-05-22 2018-11-29 주식회사 에프엔에스밸류 Système d'authentification de sécurité et procédé d'authentification de sécurité destinés à créer une clé de sécurité par combinaison de facteurs d'authentification de multiples utilisateurs

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JUSTIN MEYERS: "Track Your Lost iPhone, iPad, or Mac Even When Its Offline — As Long as This Feature Is Enabled", pages 1 - 6, XP055851325, Retrieved from the Internet <URL:https://ios.gadgethacks.com/how-to/track-your-lost-iphone-ipad-mac-even-when-its-offline-as-long-as-feature-is-enabled-0204719/> *

Also Published As

Publication number Publication date
KR20210115807A (ko) 2021-09-27

Similar Documents

Publication Publication Date Title
WO2019164339A1 (fr) Dispositif électronique et procédé de partage de données d&#39;écran
WO2019172641A1 (fr) Dispositif électronique et procédé associé de gestion de clé électronique
WO2014030836A1 (fr) Procédé et système pour authentifier une demande de transaction provenant d&#39;un dispositif
WO2020060073A1 (fr) Dispositif électronique et procédé de commande de multiples charges sans fil
WO2019066424A1 (fr) Procédé d&#39;enregistrement de réseau d&#39;un dispositif de l&#39;internet des objets, et dispositif associé
WO2014030956A1 (fr) Appareil de téléchargement en amont de contenus, appareil terminal d&#39;utilisateur de téléchargement en aval de contenus, serveur, système de partage de contenus et leur procédé de partage de contenus
WO2021033927A1 (fr) Procédé de calcul de position et dispositif électronique associé
WO2020231098A1 (fr) Appareil et procédé pour empêcher les interférences avec une communication sans fil
WO2015046954A1 (fr) Appareil et procédé permettant d&#39;accéder à un dispositif électronique ayant une fonction de point d&#39;accès sans fil
WO2021150037A1 (fr) Procédé pour fournir une interface utilisateur et dispositif électronique associé
WO2019164264A1 (fr) Appareil électronique et procédé de fonctionnement associé
WO2021141213A1 (fr) Serveur pour changer le système de frais de télécommunication d&#39;un terminal, et son procédé de fonctionnement
WO2020166932A1 (fr) Procédé pour partager des informations de communication bluetooth, et dispositif électronique associé
WO2020209596A1 (fr) Dispositif électronique et procédé de partage d&#39;informations médicales par un dispositif électronique
WO2014208984A1 (fr) Appareil et procédé de production d&#39;un environnement de sécurité
WO2019164210A1 (fr) Procédé de géorepérage basé sur des informations de paiement et dispositif associé
WO2021187730A1 (fr) Procédé et dispositif pour fournir une localisation en utilisant un dispositif périphérique
WO2020149555A1 (fr) Dispositif électronique de sélection de clé à utiliser pour le chiffrement sur la base de la quantité d&#39;informations de données à chiffrer, et procédé de fonctionnement de dispositif électronique
WO2019203443A1 (fr) Procédé d&#39;appariement de dispositifs a l&#39;aide d&#39;une communication en champ proche et appareil électronique l&#39;utilisant
WO2019172610A1 (fr) Dispositif électronique et procédé pour réaliser un paiement à l&#39;aide d&#39;un module audio
WO2019164204A1 (fr) Dispositif électronique et son procédé de fonctionnement
WO2022145768A1 (fr) Dispositif électronique effectuant une communication sans fil avec un dispositif accessoire et son procédé de fonctionnement
WO2019107975A1 (fr) Dispositif électronique de prise d&#39;image et procédé d&#39;affichage d&#39;image
WO2021201593A1 (fr) Procédé de fourniture de données et dispositif électronique prenant en charge celui-ci
WO2018169323A1 (fr) Dispositif electronique et procédé de commande associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20926159

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20926159

Country of ref document: EP

Kind code of ref document: A1