User device and operating method thereof

ABSTRACT

A security method in an electronic device is provided. The method includes pairing the electronic device with an Access Point (AP), obtaining at least one item of information about the AP, and setting a security level of the electronic device according to the at least one item of information.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application claims the benefit under 35 U.S.C. §119(a) of a Koreanpatent application filed on Jun. 4, 2013, in the Korean IntellectualProperty Office and assigned Serial number 10-2013-0063946, the entiredisclosure of which is hereby incorporated by reference.

TECHNICAL FIELD

The present disclosure relates to a user device having a securityfunction and an operating method thereof.

BACKGROUND

At present, owing to the growth of electronic communication industries,user devices such as cellular phones, electronic schedulers, personalterminals, laptop computers, and the like are becoming necessities tomodern society while being significant means for delivery of fastchanging information. The user devices make users' works convenientthrough a Graphical User Interface (GUI) environment using a touchscreen and have come to provide various multimedia based on a webenvironment. Generally, the user devices provide personalized services,and are configured to operate with security. However, users are notcurrently provided with a method or apparatus for setting a securitylevel corresponding to a surrounding environment.

The above information is presented as background information only toassist with an understanding of the present disclosure. No determinationhas been made, and no assertion is made, as to whether any of the abovemight be applicable as prior art with regard to the present disclosure.

SUMMARY

Aspects of the present disclosure are to address at least theabove-mentioned problems and/or disadvantages and to provide at leastthe advantages described below. Accordingly, an aspect of the presentdisclosure is to provide a method for setting a security level of a userdevice according to a surrounding environment.

Another aspect of the present disclosure is to provide a method forsetting a lock of a user device suitable to a security level.

Another aspect of the present disclosure is to provide a method forsetting a security level of a user device according to at least one itemof information about an Access Point (AP).

The above aspects are achieved by providing an electronic device and anoperating method thereof.

In accordance with an aspect of the present disclosure, a securitymethod in an electronic device is provided. The method includes pairingthe electronic device with an AP, obtaining at least one item ofinformation about the AP, and setting a security level of the electronicdevice according to the at least one item of information.

In accordance with another aspect of the present disclosure, anelectronic device is provided. The electronic device includes a pairingmodule, an acquisition module, and a security setting module. Thepairing module is configured to pair with an AP. The acquisition moduleis configured to obtain at least one item of information about the AP.The security setting module is configured to set a security level of theelectronic device according to the at least one item of information.

In accordance with another aspect of the present disclosure, anelectronic device is provided. The electronic device includes one ormore processors configured to execute computer programs, a memoryconfigured to store data and instructions, and at least one programstored in the memory and configured to be executable by the one or moreprocessors. The program pairs the electronic device with an AP, andadjusts a lock level of the electronic device according to userestriction information set to the AP.

Other aspects, advantages, and salient features of the disclosure willbecome apparent to those skilled in the art from the following detaileddescription, which, taken in conjunction with the annexed drawings,discloses various embodiments of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certainembodiments of the present disclosure will be more apparent from thefollowing description taken in conjunction with the accompanyingdrawings, in which:

FIG. 1 is a block diagram illustrating a construction of a user deviceaccording to an embodiment of the present disclosure;

FIG. 2 is a block diagram illustrating a construction of an electronicdevice according to an embodiment of the present disclosure;

FIG. 3 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure;

FIG. 4 is a flowchart illustrating a procedure of operation 303 of FIG.3 according to an embodiment of the present disclosure;

FIG. 5 is a flowchart illustrating a procedure of operation 303 of FIG.3 according to an embodiment of the present disclosure;

FIG. 6 is a flowchart illustrating a procedure of operation 303 of FIG.3 according to an embodiment of the present disclosure;

FIG. 7 is a flowchart illustrating a procedure of setting a userestriction level of an Access Point (AP) according to an embodiment ofthe present disclosure;

FIGS. 8, 9, and 10 are screens illustrating a procedure of setting a userestriction level of an AP according to an embodiment of the presentdisclosure;

FIGS. 11, 12, and 13 are screens illustrating a procedure of setting alock screen according to an embodiment of the present disclosure;

FIG. 14 is a flowchart illustrating an AP pairing procedure of a userdevice according to an embodiment of the present disclosure;

FIG. 15 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure;

FIG. 16 is a flowchart illustrating a procedure of operation 1505 ofFIG. 15 according to an embodiment of the present disclosure;

FIG. 17 is a flowchart illustrating a procedure of operation 1505 ofFIG. 15 according to an embodiment of the present disclosure;

FIG. 18 is a flowchart illustrating a procedure of operation 1505 ofFIG. 15 according to an embodiment of the present disclosure;

FIG. 19 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure;

FIG. 20 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure;

FIG. 21 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure;

FIG. 22 is a flowchart illustrating a procedure of operation 2105 ofFIG. 21 according to an embodiment of the present disclosure; and

FIGS. 23, 24, and 25 are diagrams illustrating lock screens according toan embodiment of the present disclosure.

Throughout the drawings, it should be noted that like reference numbersare used to depict the same or similar elements, features, andstructures.

DETAILED DESCRIPTION

The following description with reference to the accompanying drawings isprovided to assist in a comprehensive understanding of variousembodiments of the present disclosure as defined by the claims and theirequivalents. It includes various specific details to assist in thatunderstanding but these are to be regarded as merely exemplary.Accordingly, those of ordinary skill in the art will recognize thatvarious changes and modifications of the various embodiments describedherein can be made without departing from the scope and spirit of thepresent disclosure. In addition, descriptions of well-known functionsand constructions may be omitted for clarity and conciseness.

The terms and words used in the following description and claims are notlimited to the bibliographical meanings, but, are merely used by theinventor to enable a clear and consistent understanding of the presentdisclosure. Accordingly, it should be apparent to those skilled in theart that the following description of various embodiments of the presentdisclosure is provided for illustration purpose only and not for thepurpose of limiting the present disclosure as defined by the appendedclaims and their equivalents.

It is to be understood that the singular forms “a,” “an,” and “the”include plural referents unless the context clearly dictates otherwise.Thus, for example, reference to “a component surface” includes referenceto one or more of such surfaces.

FIG. 1 is a block diagram illustrating a construction of a user deviceaccording to an embodiment of the present disclosure.

The user device 100 may be one of an electronic device such as a mobilephone, a mobile pad, a media player, a tablet computer, a handheldcomputer, a Personal Digital Assistant (PDA), and a digital camera.Also, the user device 100 may be any user device including a devicecombining two or more functions among these devices.

Referring to FIG. 1, the user device 100 can include a processor 101, amemory 103, a speaker 104, a microphone 105, a camera 106, a display107, a touch panel 108, a sensor 109, a Power Manager Integrated Circuit(PMIC) 110, a battery 111, a cellular antenna 112, a Front End Module(FEM) 113, a Wireless Connectivity (WC) antenna 114, WC 115, and a RadioFrequency Integrated Circuit (RFIC) 116.

The processor 101 controls the general operation of the user device 100.The processor 101 performs a function of executing an Operating System(OS) and an application program of the user device 100 and controllingother parts and devices. The processor 101 can include an ApplicationProcessor (AP) for performing a key function of the entire system, aCommunication Processor (CP) for performing communication, a GraphicProcessing Unit (GPU) for processing 2-Dimensional (2D) and3-Dimensional (3D) graphics, an Image Signal Processor (ISP) for takingcharge of image signal processing, an Audio Signal Processor (ASP) fortaking charge of voice signal processing, a memory semiconductor, asystem interface, and the like. The processor 101 can be a System OnChip (SOC) in which various parts are integrated as one.

The AP plays a brain role of the user device 100, and can support afunction of computation processing, a function of playing contents ofvarious formats such as an audio, an image, a video, and the like, agraphic engine, and the like. The AP can drive an operating systemapplied to the user device 100, various functions, and the like. The APcan perform a great number of functions of a core, a memory, a displaysystem/controller, a multimedia encoding/decoding (CODEC), a 2D/3Daccelerator engine, an Image Signal Processor (ISP), a camera, an audio,a modem, various high and low speed serial/parallel connectivityinterfaces, and the like. The AP can execute various software programs(i.e., instruction sets) stored in the memory 103 to perform variousfunctions of the user device 100, and perform processing and control forvoice communication, image communication, and data communication. The APcan execute software programs (i.e., instruction sets) stored in thememory 103 to perform various functions corresponding to the programs.The AP can be an SOC integrating all of a GPU, an ISP, an ASP, a memorysemiconductor, and a system interface.

The CP can perform voice communication and/or data communication, andcan compress voice data and image data or decompress the compressionthereof. The CP can be a baseband modem, a Baseband Processor (BP), orthe like. The CP can be designed to operate through one of a GlobalSystem for Mobile Communication (GSM) network, an Enhanced Data GSMEnvironment (EDGE) network, a Code Division Multiple Access (CDMA)network, a Wireless-Code Division Multiple Access (W-CDMA) network, aLong Term Evolution (LTE) network, an Orthogonal Frequency DivisionMultiple Access (OFDMA) network, a WiFi network, a Wirelessinteroperability for Microwave Access (WiMAX) network, and a BLUETOOTHnetwork.

The GPU can process computation related to graphics, and take charge ofimage information processing, acceleration, signal conversion, pictureoutput, and the like. The GPU can solve a bottleneck phenomenon causedby a graphic work of the AP, and can process 2D or 3D graphics fasterthan the AP.

The ISP can convert electrical signals (i.e., image data) from thecamera 106, into image signals. The ISP can change a color sense of theimage data from the camera 106 into a format such as a real image, andcan adjust brightness. The ISP can perform Automatic Exposure (AE),Automatic White-Balance (AWB) automatically adjusting a white balanceaccording to a change of a color temperature of an incident lightsource, Automatic Focus (AF) automatically focusing a subject, and thelike. The ISP can analyze a frequency component of the image dataobtained from the camera 106, and recognize a definition of an image toadjust an F-number of the iris of the camera 106 and a shutter speed.The ISP can temporarily store the image data from the camera 106 in thememory 103 (e.g., buffer memory).

The ASP can process computation related to an audio, and can change anaudio signal of a digital or analog form through an audio effect oreffect unit.

The memory 103 can store software related programs (i.e., instructionsets) executable by the aforementioned processors. The memory 103 caninclude high-speed random access memories and/or non-volatile memoriessuch as one or more magnetic disk storage devices, one or more opticalstorage devices and/or flash memories (for example, Not AND (NAND)memories, Not OR (NOR) memories). A total of storage time of video dataobtained from an image sensor can be proportional to an availablecapacity of the memory 103.

Software can include an OS program, a communication program, a cameraprogram, a graphical program, one or more application programs, a userinterface program, a CODEC program, a security program, and the like.The term of program may be expressed as a set of instructions or aninstruction set. The OS program can use various functions of thecommunication program, the camera program, the graphical program, theone or more application programs, the user interface program, and theCODEC program through various Application Programming Interfaces (APIs).

The OS program indicates an embedded operating system such as WINDOWS,LINUX, Darwin, RTXC, UNIX, OS X, or VxWorks, and can include varioussoftware constituent elements controlling general system operation.Control of the general system operation can include memory control andmanagement, storage hardware (device) control and management, powercontrol and management, and the like. Also, the OS program can perform afunction of smoothing communication between various hardware (devices)and software constituent elements (programs). The communication programcan enable communication with a computer, a server, a user device, andthe like through the WC 115, the RFIC 116, or an external port.

The camera program can include a camera related software constituentelement enabling camera related processes and functions. Under supportof an API such as Open Graphics Library (OpenGL), DirectX and the like,the camera program can perform preprocessing applying various effects toan image from the image sensor of the camera 106 and postprocessingapplying various effects to a captured snap image. If video data fromthe camera 106 reaches a transmission capacity (e.g., an availablecapacity of the memory 103 or a capacity of the buffer memory), thecamera program can convert the video data into a video file, andtransmit the converted video file to an external storage (e.g., aserver, an external memory, or the like).

The graphical program can include various software constituent elementsfor providing and displaying graphics on the display 107. The graphicalprogram can create graphics based on an API such as OpenGL, DirectX, andthe like, and can provide various filters capable of applying variouseffects to an image. The term of graphics indicates a text, a web page,an icon, a digital image, a video, an animation, and the like. Thegraphical program can be an image viewer, an image edit program and thelike adapting usability to postprocessing an image, and can be a camerarelated program, a video call related program, and the like optimized topreprocessing an image. The graphical program can perform postprocessingapplying various effects to a rendering-completed image, or performpreprocessing applying various effects for an image. Filters for theseeffects can be collectively managed such that they can be used commonlyto other programs as aforementioned.

The application program can include a browser, an electronic mail(e-mail), an instant message, word processing, keyboard emulation, anaddress book, a touch list, a widget, Digital Right Management (DRM),voice recognition, voice replication, a position determining function, alocation based service, and the like. The user interface program caninclude various software constituent elements related to a userinterface. The user interface program can include information about howa state of the user interface is changed, whether the change of thestate of the user interface is carried out in which condition, and thelike.

The CODEC program can include a software constituent element related toencoding and decoding of a video file.

The security program can pair with an AP, obtain at least one item ofinformation about the AP, and set a security level according to the atleast one item of information. The security program can set a lock ofthe user device according to the security level. The security programcan release the lock of the user device according to the security levelor maintain the lock of the user device or change the lock of the userdevice into other schemes. When a use restriction on the AP has beenset, the security program can set the security level high and, when theuse restriction on the AP has not been set, the security program can setthe security level low. When a use restriction level set to the AP ishigh, the security program can set the security level high and, when theuse restriction level set to the AP is low, the security program can setthe security level low. When an encryption scheme (e.g., a password) forpairing with the AP has been set, the security program can decrease thesecurity level and, when the encryption scheme for pairing with the APhas not been set, the security program can increase the security level.According to the coincidence or non-coincidence of a password forpairing with the AP with a password for releasing the lock of the userdevice, the security program can adjust the security level. On the basisof an RF signal of the AP, the security program can determine a ReceivedSignal Strength Indication (RSSI). When the RSSI exceeds a thresholdvalue, the security program can set the security level low and, when theRSSI does not exceed the threshold value, the security program can setthe security level high. When a current location of the user device isincluded in an area set to the AP, the security program may set thesecurity level low and, when the current location is not included in thearea set to the AP, the security program may set the security levelhigh. When a current time belongs to a time zone set to the AP, thesecurity program may set the security level low and, when the currenttime does not belong to the time zone set to the AP, the securityprogram may set the security level high.

Besides the aforementioned programs, the memory 103 can further includeadditional programs (instructions). Also, various functions of the userdevice 100 can be executed by hardware and/or software and/or acombination thereof, which may include one or more of stream processingand Application Specific Integrated Circuits (ASICs).

The speaker 104 can convert electrical signals into audible frequencyband signals and output the audible frequency band signals. Themicrophone 105 can convert sound waves forwarded from human or othersound sources into electrical signals.

The camera 106 can convert light reflected from a camera target intoelectrical signals. The camera 106 can include an image sensor such as aCharged Coupled Device (CCD), a Complementary Metal-Oxide-Semiconductor(CMOS), or the like. The image sensor can perform a camera function ofphoto and video clip recording and the like. According to a cameraprogram executed by the AP of the processor 101, the image sensor canchange a hardware construction, for example, move a lens and adjust anF-number of the iris, and the like.

The display 107 can output electrical signals as visual information(e.g., a text, a graphic, a video, and the like). The display 107 may beone of an Electro Wetting Display (EWD), an Electronic paper (E-paper),a Plasma Display Panel (PDP), a Liquid Crystal Display (LCD), an OrganicLight Emitting Diode (OLED), and an Active Matrix OLED (AMOLED).

The touch panel 108 can receive a touch input. The touch panel 108 maybe one of a digitizer for stylus pen, a capacitive overlay touch panel,a resistance overlay touch panel, a surface acoustic wave touch panel,an infrared beam touch panel, and the like.

The sensor 109 can sense or distinguish and measure a physical quantityof heat, light, temperature, pressure, sound, position, or the like, ora change thereof. The sensor 109 can include a temperature sensor, apressure sensor, a magnetic sensor, an optical sensor, an acousticsensor, a capacitance sensor, a Global Positioning System (GPS) sensor,and the like.

The PMIC 110 can adjust power from the battery 111. For example, theprocessor 101 can transmit an interface signal dependent on a load toprocess, to the PMIC 110. Adaptively to the processor 101, the PMIC 110can adjust a core voltage supplied to the processor 101, so theprocessor 101 can be driven all the time at a minimum power. The PMIC110 can be constructed in relation to at least one of the WC 115, thememory 103, the speaker 104, the microphone 105, the camera 106, thedisplay 107, the touch panel 108, etc., as well as the processor 101.One integrated PMIC is constructed, and the integrated PMIC may adjust abattery power related to at least one of the aforementioned constituentelements as well as the processor 101.

The FEM 113 can be a transmitting/receiving device capable ofcontrolling an electric wave signal. The FEM 113 can connect thecellular antenna 112 and the RFIC 116 and divide transmission/receptionsignals. The FEM 113 can play a role of filtering and amplification. TheFEM 113 may include a reception end FEM which embeds a filter filteringa reception signal, and a transmission end FEM which embeds a PowerAmplifier Module (PAM) amplifying a transmission signal.

The WC 115 can perform various communication functions that theprocessor 101 does not process, for example, WiFi, BLUETOOTH, Near FieldCommunication (NFC), Universal Serial Bus (USB), GPS, and the like.

The RFIC (e.g., RF transceiver) 116 can receive an electric wave from abase station, and modulate a received high frequency into a lowfrequency (i.e., baseband frequency) such that the modem (e.g., the CP)can process the low frequency. The RFIC 116 can modulate a low frequencyprocessed in the modem into a high frequency for transmission to thebase station.

FIG. 2 is a block diagram illustrating a construction of an electronicdevice according to an embodiment of the present disclosure.

Referring to FIG. 2, the user device (e.g., electronic device 100) mayinclude the processor 101 including a search module 210, an acquisitionmodule 220, a security setting module 230, a lock module 240, a pairingmodule 250, and a display module 260.

The search module 210 can search for a network or an AP that can pairwith the user device 100.

The acquisition module 220 can obtain at least one item of informationabout the network or AP searched by the search module 210. The at leastone item of information about the AP may include use restrictioninformation (e.g., a use restriction or not, or a use restrictionlevel), RSSI, a location of the user device 100, a current time,previous pairing or non-pairing with the AP, a password for pairing withthe AP, and the like. The acquisition module 220 may obtain theaforementioned information using the sensor 109.

According to the at least one item of information obtained by theacquisition module 220, the security setting module 230 can set asecurity level of the user device 100.

The lock module 240 can set lock of the user device suitable to thesecurity level set by the security setting module 230. The lock module240 can set a lock scheme suitable to the security level set by thesecurity setting module 230. The lock scheme can be a lock using apassword, a touch pattern, biometric recognition, or the like. When thesecurity level is low, the lock module 240 can release the lock of theuser device and, when the security level is high, the lock module 240can execute the lock of the user device. When the security level is low,the lock module 240 can maintain an existing lock scheme (e.g., apassword) and when the security level is high, the lock module 240 canchange the lock scheme (e.g., the password) into other lock schemes ofhigher security (e.g., biometric recognition).

The pairing module 250 can pair with the AP searched by the searchmodule 210. According to the at least one information obtained by theacquisition module 220, the pairing module 250 can set pairing with theAP. The at least one item of information may include one or more of theRSSI, a previous pairing or non-pairing with the AP, the location of theuser device 100, the current time, and the like.

The display module 260 can display the result processed by the searchmodule 210, the acquisition module 220, the security setting module 230,and the pairing module 250.

FIG. 3 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure.

Referring to FIG. 3, in operation 301, the processor 101 (e.g., thepairing module 250) can perform pairing with an AP.

In operation 303, the processor 101 (e.g., the security setting module230) can set a security level of the user device according to a userestriction level set at the AP. The use restriction level set at the APcan be obtained by the acquisition module 220.

In operation 305, the processor 101 (e.g., the lock module 250) can seta lock of the user device according to the security level. The processor101 can set a lock scheme (e.g., a password, a touch pattern, biometricrecognition, or the like) suitable to the security level, to the userdevice. When the security level is low, the processor 101 can releasethe lock of the user device, and when the security level is high, theprocessor 101 can execute the lock of the user device. When the securitylevel is low, the processor 101 can maintain an existing lock scheme(e.g., a password), and when the security level is high, the processor101 can change the previously used lock scheme (e.g., the password) intoa lock scheme of higher security (e.g., biometric recognition).

FIG. 4 is a flowchart illustrating a procedure of operation 303 of FIG.3 according to an embodiment of the present disclosure.

Referring to FIG. 4, in operation 401, the processor 101 (e.g., thesecurity setting module 230) can determine whether a use restrictionlevel set at an AP is high or low.

If the use restriction level set at the AP is high, in operation 403,the processor 101 (e.g., the security setting module 230) can set thesecurity level high.

If the use restriction level set at the AP is low, in operation 405, theprocessor 101 (e.g., the security setting module 230) can set thesecurity level low.

FIG. 5 is a flowchart illustrating a procedure of operation 303 of FIG.3 according to an embodiment of the present disclosure.

Referring to FIG. 5, in operation 501, the processor 101 (e.g., thesecurity setting module 230) can identify whether it is an AP set to asafety zone.

If it is the AP set to the safety zone, in operation 503, the processor101 (e.g., the security setting module 230) can set the security levellow.

If it is the AP not set to the safety zone, in operation 505, theprocessor 101 (e.g., the security setting module 230) can set thesecurity level high.

FIG. 6 is a flowchart illustrating a procedure of operation 303 of FIG.3 according to an embodiment of the present disclosure.

Referring to FIG. 6, in operation 601, the processor 101 (e.g., thesecurity setting module 230) can identify whether it is an AP set to asecure area.

If it is the AP set to the secure area, in operation 603, the processor101 (e.g., the security setting module 230) can set the security levelhigh.

If it is the AP not set to the secure area, in operation 605, theprocessor 101 (e.g., the security setting module 230) can set thesecurity level low.

FIG. 7 is a flowchart illustrating a procedure of setting a userestriction level of an AP according to an embodiment of the presentdisclosure.

Referring to FIG. 7, in operation 701, the processor 101 (e.g., thesearch module 210) can search at least one pairable AP.

In operation 703, the processor 101 (e.g., the display module 260) candisplay an icon corresponding to the searched at least one AP.

According to the selection of the icon, in operation 705, the processor101 (e.g., the display module 260) can display a menu for selecting ause restriction level of the AP.

According to the selection of the use restriction level of the AP, inoperation 707, the processor 101 (e.g., the security setting module 230)can set the use restriction level to the AP.

FIGS. 8 to 10 are screens illustrating a procedure of setting a userestriction level of an AP according to an embodiment of the presentdisclosure.

Referring to FIG. 8, the user device 100 can search at least one APpairable with the user device 100, and display icons 803 correspondingto the searched at least one AP. If a user selects an icon 805 among theicons 803, the user device 100 can provide a screen of FIG. 9 or FIG.10.

Referring to FIG. 9, according to the selection of the icon 805, theuser device 100 can display a menu 901 for selecting a use restrictionlevel of the AP. For example, the menu 901 can include an icon 903indicating a secure area and an icon 905 indicating an insecure area. Ifthe user selects one of the icon 903 indicating the secure area and theicon 905 indicating the insecure area, the user device 100 can set a userestriction level corresponding to the selected icon, to the AP.

Referring to FIG. 10, according to the selection of the icon 805, theuser device 100 can display a menu 1001 for selecting a use restrictionlevel of the AP. For example, the menu 1001 can display icons (e.g.,low, average, and high) divided by use restriction level.

Although not illustrated, according to icon selection, the user device100 may display a menu for enabling the user to set use informationabout the AP, for example, an area, a time zone, or the like.

FIGS. 11 to 13 are screens illustrating a procedure of setting a lockscreen according to an embodiment of the present disclosure.

Referring to FIG. 11, the user device 100 can display an icon 1101 forexecution of lock screen option. If a user selects the icon 1101, theuser device 100 can provide a screen of FIG. 12.

Referring to FIG. 12, according to the execution of the lock screenoption, the user device 100 can display an icon 1201 indicating safetyzone WiFi and an icon 1203 indicating secure area WiFi. If the userselects one of the icon 1201 indicating the safety zone WiFi and theicon 1203 indicating the secure area WiFi, the user device 100 canprovide a screen of FIG. 13.

Referring to FIG. 13, according to the selection of the icon 1201 or1203, the user device 100 can set a lock level of the user device 100 onthe basis of an AP to which a use restriction (e.g., a safety zone orsecure area) is preset, and can display status information 1303 in astatus display bar 1301.

FIG. 14 is a flowchart illustrating an AP pairing procedure of a userdevice according to an embodiment of the present disclosure.

Referring to FIG. 14, in operation 1401, the processor 101 (e.g., thesearch module 210) can search an AP.

In operation 1403, the processor 101 (e.g., the acquisition module 220)can acquire at least one item of information about the searched AP. Theat least one item of information about the AP can include an RSSI, alocation of the user device, a current time, a previous pairing ornon-pairing with the AP, and the like.

In operation 1405, according to the acquired at least one item ofinformation, the processor 101 (e.g., the pairing module 250) can setpairing or non-pairing with the AP. If the RSSI exceeds a thresholdvalue, the processor 101 can pair with the AP. If the location of theuser device is included in an area set to the AP, the processor 101 canpair with the AP. If the current time is included in a time zone set tothe AP, the processor 101 can pair with the AP. If the AP has ever beenpaired previously, the processor 101 can pair with the AP. If theacquired at least one item of information is equal to or greater than areference with information set to the AP, the processor 101 can pairwith the AP.

FIG. 15 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure.

Referring to FIG. 15, in operation 1501, the processor 101 (e.g., thepairing module 250) can pair with an AP. By performing theaforementioned procedure of FIG. 14, the processor 101 can pair with theAP.

In operation 1503, the processor 101 (e.g., the acquisition module 220)can acquire at least one item of information about the AP. The at leastone item of information about the AP can include use restrictioninformation (e.g., a use restriction or not, or a use restrictionlevel), an RSSI, a location of the user device, a current time, aprevious pairing or non-pairing with the AP, a password necessary forpairing with the AP, and the like.

In operation 1505, according to the at least one item of information,the processor 101 (e.g., the security setting module 230) can set asecurity level. For example, if a use restriction on the AP is set(e.g., a secure area), the processor 101 can set the security level highand, if the use restriction on the AP is not set (e.g., a safety zone),the processor 101 can set the security level low. If a user restrictionlevel of the AP is set high, the processor 101 can set the securitylevel high, and if the use restriction level of the AP is set low, theprocessor 1101 can set the security level low.

In operation 1507, the processor 101 (e.g., the lock module 250) can seta lock of the user device according to the security level. The processor101 can set a lock scheme (e.g., a password, a touch pattern, biometricrecognition, or the like) suitable to the security level, to the userdevice. When the security level is low, the processor 101 can releasethe lock of the user device, and when the security level is high, theprocessor 101 can execute the lock of the user device. When the securitylevel is low, the processor 101 can maintain an existing lock scheme(e.g., a password), and when the security level is high, the processor101 can change the previously used lock scheme (e.g., the password) intoa lock scheme of higher security (e.g., biometric recognition).

FIG. 16 is a flowchart illustrating a procedure of operation 1505 ofFIG. 15 according to an embodiment of the disclosure.

Referring to FIG. 16, in operation 1601, the processor 101 (e.g., thesecurity setting module 230) can identify if a use restriction on an APhas been set.

If the use restriction on the AP has been set, in operation 1603, theprocessor 101 (e.g., the security setting module 230) can identifywhether an RSSI exceeds a threshold value. The RSSI can be obtained bythe acquisition module 220.

If the RSSI exceeds the threshold value, in operation 1605, theprocessor 101 (e.g., the security setting module 230) can set a securitylevel low.

If the RSSI does not exceed the threshold value, in operation 1607, theprocessor 101 (e.g., the security setting module 230) can set thesecurity level high.

FIG. 17 is a flowchart illustrating a procedure of operation 1505 ofFIG. 15 according to an embodiment of the present disclosure.

Referring to FIG. 17, in operation 1701, the processor 101 (e.g., thesecurity setting module 230) can identify if a use restriction on an APhas been set.

If the use restriction on the AP has been set, in operation 1703, theprocessor 101 (e.g., the security setting module 230) can identify if alocation of a user device belongs to an area set to the AP. Theacquisition module 220 can obtain the location of the user device usingthe sensor 109.

If the location of the user device belongs to the area set to the AP, inoperation 1705, the processor 101 (e.g., the security setting module230) can set a security level low.

If the location of the user device does not belong to the area set tothe AP, in operation 1707, the processor 101 (e.g., the security settingmodule 230) can set the security level high.

FIG. 18 is a flowchart illustrating a procedure of operation 1505 ofFIG. 15 according to an embodiment of the present disclosure.

Referring to FIG. 18, in operation 1801, the processor 101 (e.g., thesecurity setting module 230) can identify if a use restriction on an APhas been set.

If the use restriction on the AP has been set, in operation 1803, theprocessor 101 (e.g., the security setting module 230) can identify if acurrent time belongs to a time zone set to the AP.

If the current time belongs to the time zone set to the AP, in operation1805, the processor 101 (e.g., the security setting module 230) can seta security level low.

If the current time does not belong to the time zone set to the AP, inoperation 1807, the processor 101 (e.g., the security setting module230) can set the security level high.

FIG. 19 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure.

Referring to FIG. 19, in operation 1901, the processor 101 (e.g., thesearch module 210) can search an AP pairable with the user device.

In operation 1903, the processor 101 (e.g., the security setting module230) can identify if a use restriction on the AP has been set. Thisinformation can be obtained by the acquisition module 220.

If the use restriction on the AP has not been set, in operation 1911,the processor 101 (e.g., the pairing module 250) can pair with the AP.

If the use restriction on the AP has been set, in operation 1905, theprocessor 101 (e.g., the security setting module 230) can identify ifthere is previous pairing information with the AP. This information canbe obtained by the acquisition module 220.

If there is the previous pairing information with the AP, in operation1907, the processor 101 (e.g., the pairing module 250) can pair with theAP.

In operation 1909, the processor (e.g., the security setting module 230)can set a security level high.

If there is not the previous pairing information with the AP, inoperation 1913, the processor 101 (e.g., the security setting module230) can identify whether an encryption scheme (e.g., a password) forpairing with the AP has been set. This information can be obtained bythe acquisition module 220.

If the password for pairing with the AP has been set, in operation 1915,the processor 101 (e.g., the security setting module 230) can set thesecurity level low.

If the password for pairing with the AP has not been set, in operation1909, the processor 101 (e.g., the security setting module 230) can setthe security level high.

FIG. 20 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure.

Referring to FIG. 20, in operation 2001, the processor 101 (e.g., thesearch module 210) can search an AP pairable with the user device.

In operation 2003, the processor 101 (e.g., the security setting module230) can identify if a use restriction on the AP has been set. Thisinformation can be obtained by the acquisition module 220.

If the use restriction on the AP has not been set, in operation 2013 theprocessor 101 (e.g., the pairing module 250) can pair with the AP.

If the use restriction on the AP has been set, in operation 2005, theprocessor 101 (e.g., the security setting module 230) can identify ifthere is previous pairing information with the AP. This information canbe obtained by the acquisition module 220.

If there is the previous pairing information with the AP, in operation2007, the processor 101 (e.g., the pairing module 250) can pair with theAP.

In operation 2009, the processor (e.g., the security setting module 230)can identify if an RSSI exceeds a threshold value. The RSSI can bemeasured by the acquisition module 220.

If the RSSI exceeds the threshold value, in operation 2011, theprocessor 101 (e.g., the securing setting module 230) can set a securitylevel low.

If the RSSI does not exceed the threshold value, in operation 2017, theprocessor 101 (e.g., the securing setting module 230) can set thesecurity level high.

If there is not the previous pairing information with the AP, inoperation 2015, the processor 101 (e.g., the security setting module230) can identify whether a password for pairing with the AP has beenset. The password necessary for pairing with the AP can be obtained bythe acquisition module 220.

If the password for pairing with the AP has been set, in operation 2011,the processor 101 (e.g., the security setting module 230) can set thesecurity level low.

If the password for pairing with the AP has not been set, in operation2017, the processor 101 (e.g., the security setting module 230) can setthe security level high.

FIG. 21 is a flowchart illustrating a security setting procedure of auser device according to an embodiment of the present disclosure.

Referring to FIG. 21, in operation 2101, the processor 101 (e.g., thepairing module 250) can pair with a network.

In operation 2103, the processor 101 (e.g., the acquisition module 220)can acquire at least one item of information about the network. The atleast one item of information about the network can include userestriction information (e.g., a use restriction or not, or a userestriction level) about the network, an RSSI, a location of the userdevice, a current time, a previous pairing or non-pairing with thenetwork, a password necessary for pairing with the network, and thelike.

In operation 2105, according to the at least one item of information,the processor 101 (e.g., the security setting module 230) can set asecurity level. For example, if a user restriction level of the networkis set high, the processor 101 can set the security level high and, ifthe use restriction level of the network is set low, the processor 1101can set the security level low.

In operation 2107, the processor 101 (e.g., the lock module 250) can seta lock of the user device according to the security level. The processor101 can set a lock scheme (e.g., a password, a touch pattern, biometricrecognition, or the like) suitable to the security level, to the userdevice. When the security level is low, the processor 101 can releasethe lock of the user device, and when the security level is high, theprocessor 101 can execute the lock of the user device. When the securitylevel is low, the processor 101 can maintain an existing lock scheme(e.g., a password), and when the security level is high, the processor101 can change the previously used lock scheme (e.g., the password) intoa lock scheme of higher security (e.g., biometric recognition).

FIG. 22 is a flowchart illustrating a procedure of operation 2105 ofFIG. 21 according to an embodiment of the present disclosure.

Referring to FIG. 22, in operation 2201, the processor 101 (e.g., thesecurity setting module 230) can identify if a use restriction on anetwork has been set.

If the use restriction on the network has been set, in operation 2203,the processor 101 (e.g., the security setting module 230) can identifyif a password set for lock of the user device 100 coincides with apassword necessary for pairing with the network.

If the password set for the lock of the user device 100 does notcoincide with the password necessary for pairing with the network, inoperation 2207, the processor 101 (e.g., the security setting module230) can set a security level low.

If the password set for the lock of the user device 100 coincides withthe password necessary for pairing with the network, in operation 2205,the processor 101 (e.g., the security setting module 230) can set thesecurity level high.

FIGS. 23 to 25 are diagrams illustrating lock screens according to anembodiment of the present disclosure. The user device 100 can provide alock screen suitable to a security level that is set to the user device100.

Referring to FIG. 23, the user device 100 can provide a lock screen of atouch pattern scheme. If a user inputs a touch pattern joiningpredefined pointers together through touch and drag operations, the userdevice 100 can release the lock of the user device 100.

Referring to FIG. 24, the user device 100 can provide a lock screen of apassword scheme. If the user inputs a correct password to the userdevice 100, the user device 100 can release the lock of the user device100.

Referring to FIG. 25, the user device 100 can provide a lock screen of aPersonal Identification Number (PIN) scheme. If the user inputs acorrect PIN, the user device 100 can release lock of the user device100.

Though not illustrated, the user device 100 may provide a lock screenusing biometric recognition (e.g., voice recognition, fingerprintrecognition, iris recognition, face recognition, or the like).

As described above, a user device can set a security level high or lowaccording to at least one information (e.g., use restrictioninformation) on an AP pairing with the user device. The user deviceprovides a lock scheme (e.g., password, biometric recognition, or thelike) suitable to the security level, and adjusts the security level foruse of wireless communication through the paired AP, thereby being ableto satisfy a user's convenience.

According to various embodiments of the present disclosure, respectivemodules can be configured by software, firmware, hardware or acombination thereof Also, some or all of the modules may be constructedin one entity, and can identically perform a function of each module.According to various embodiments of the present disclosure, respectiveoperations can be executed sequentially, repeatedly, or in parallel.Also, some of the operations can be omitted or other operations can beadded and executed. For example, the respective operations can beexecuted by corresponding modules described in the present disclosure.

Methods according to various embodiments disclosed in the claims and/orspecification of the present disclosure can be implemented in a form ofhardware, software, or a combination of the hardware and the software,for a general purpose or a specialized processor to be configured toexecute an embodiment of the present disclosure.

In a case of implementing in the software form, a computer readablestorage medium storing one or more programs (i.e., software modules) maybe provided. One or more programs stored in the computer readablestorage medium are executable by one or more processors within anelectronic device. The one or more programs may include instructions forenabling the electronic device to execute the methods according to thevarious embodiments disclosed in the claims and/or specification of thepresent disclosure.

These programs (i.e., software modules or software) can be stored in aRandom Access Memory (RAM), a nonvolatile memory including a flashmemory, a Read Only Memory (ROM), an Electrically Erasable ProgrammableROM (EEPROM), a magnetic disk storage device, a Compact Disk ROM(CD-ROM), a Digital Versatile Disk (DVD) or an optical storage device ofother form, and a magnetic cassette. Or, the programs can be stored in amemory configured by a combination of some or all of the foregoing.Also, each configuration memory may be plural in number.

Also, the programs can be stored in an attachable storage deviceaccessible to the electronic device through a communication network suchas the Internet, an intranet, a Local Area Network (LAN), a Wireless LAN(WLAN) and a Storage Area Network (SAN), or a communication networkconfigured by a combination of the foregoing. This storage device canaccess the electronic device through an external port.

Also, a separate storage device on a communication network may access aportable electronic device.

While the present disclosure has been shown and described with referenceto various embodiments thereof, it will be understood by those skilledin the art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the present disclosure asdefined by the appended claims and their equivalents.

What is claimed is:
 1. A security method in an electronic device, themethod comprising: pairing the electronic device with an Access Point(AP); obtaining at least one item of information about the AP; andsetting a security level of the electronic device according to the atleast one item of information.
 2. The method of claim 1, furthercomprising setting a lock of the electronic device according to the setsecurity level of the electronic device.
 3. The method of claim 2,wherein the setting of the lock of the electronic device according tothe security level comprises one of releasing the lock of the electronicdevice, maintaining the lock of the electronic device, and changing thelock of the electronic device into other schemes.
 4. The method of claim1, wherein the at least one item of information comprises a setting ornon-setting of a use restriction on the AP, and wherein the setting ofthe security level according to the at least one item of informationsets the security level high if there exists the setting of the userestriction on the AP, and sets the security level low if there does notexist the setting of the use restriction on the AP.
 5. The method ofclaim 1, wherein the at least one item of information comprises a userestriction level of the AP, and wherein the setting of the securitylevel according to the at least one item of information sets thesecurity level high if the use restriction level of the AP is high, andsets the security level low if the use restriction level of the AP islow.
 6. The method of claim 1, wherein the at least one item ofinformation comprises information of whether an encryption scheme forpairing with the AP has been set, and wherein the setting of thesecurity level according to the at least one item of informationdecreases the security level if the encryption scheme has been set, andincreases the security level if the encryption scheme has not been set.7. The method of claim 1, wherein the at least one item of informationcomprises a password for pairing with the AP, and wherein the setting ofthe security level according to the at least one item of informationadjusts the security level according to a coincidence or non-coincidenceof the password for pairing with the AP with a password necessary forreleasing a lock of the electronic device.
 8. The method of claim 1,wherein the at least one item of information comprises a Radio Frequency(RF) signal of the AP, and wherein the setting of the security levelaccording to the at least one item of information determines a ReceivedSignal Strength Indication (RSSI) on a basis of the RF signal, and setsthe security level according to a comparison result between the RSSI anda threshold value.
 9. The method of claim 1, wherein the at least oneitem of information comprises a location of the electronic device or acurrent time, and wherein the setting of the security level according tothe at least one item of information sets the security level accordingto whether the location or current time belongs to an area or time zoneset to the AP.
 10. An electronic device comprising: a pairing moduleconfigured to pair with an Access Point (AP); an acquisition moduleconfigured to obtain at least one item of information about the AP; anda security setting module configured to set a security level of theelectronic device according to the at least one item of information. 11.The electronic device of claim 10, further comprising a lock moduleconfigured to set a lock of the electronic device according to the setsecurity level of the electronic device.
 12. The electronic device ofclaim 11, wherein the lock module one of releases the lock of theelectronic device, maintains the lock of the electronic device, andchanges the lock of the electronic device into other schemes.
 13. Theelectronic device of claim 10, wherein the at least one item ofinformation comprises a setting or non-setting of a use restriction onthe AP, and wherein the security setting module sets the security levelhigh if there exists the setting of the use restriction on the AP, andsets the security level low if there does not exist the setting of theuse restriction on the AP.
 14. The electronic device of claim 10,wherein the at least one item of information comprises a use restrictionlevel of the AP, and wherein the security setting module sets thesecurity level high if the use restriction level of the AP is high, andsets the security level low if the use restriction level of the AP islow.
 15. The electronic device of claim 10, wherein the at least oneitem of information comprises information of whether an encryptionscheme for pairing with the AP has been set, and wherein the securitysetting module decreases the security level if the encryption scheme hasbeen set, and increases the security level if the encryption scheme hasnot been set.
 16. The electronic device of claim 10, wherein the atleast one item of information comprises a password for pairing with theAP, and wherein the security setting module adjusts the security levelaccording to a coincidence or non-coincidence of the password forpairing with the AP with a password necessary for releasing a lock ofthe electronic device.
 17. The electronic device of claim 10, whereinthe at least one item of information comprises a Radio Frequency (RF)signal of the AP, and wherein the security setting module determines aReceived Signal Strength Indication (RSSI) on a basis of the RF signal,and sets the security level according to a comparison result between theRSSI and a threshold value.
 18. The electronic device of claim 10,wherein the at least one item of information comprises a location of theelectronic device or a current time, and wherein the security settingmodule sets the security level according to whether the location orcurrent time belongs to an area or time zone set to the AP.
 19. Anelectronic device comprising: one or more processors configured toexecute computer programs; a memory configured to store data andinstructions; and at least one program stored in the memory andconfigured to be executable by the one or more processors, wherein theprogram pairs the electronic device with an Access Point (AP) andadjusts a lock level of the electronic device according to userestriction information set to the AP.
 20. The electronic device ofclaim 19, wherein the use restriction information comprises one ofsetting a use restriction, not setting the use restriction, and a userestriction level.