Mobile device, method for displaying screen thereof, wearable device, method for driving the same, and computer-readable recording medium

ABSTRACT

A mobile device, a method for displaying a screen thereof, a wearable device, a method for driving the same, and a computer-readable recording medium are provided. The mobile device operating with a wearable device includes a display configured to display a private screen which is personalized to a user after authentication of the wearable device based on at least one of a user state and an operational state of the mobile device and a controller configured to control the display to display the private screen after the authentication.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation application of prior application Ser.No. 14/818,490, filed on Aug. 5, 2015 which was based and claimedpriority under 35 U.S.C. § 119(a) of a Korean patent application number10-2014-0100670, filed on Aug. 5, 2014 in the Korean IntellectualProperty Office, the disclosure of which is incorporated by referenceherein in its entirety.

TECHNICAL FIELD

The present disclosure relates to a mobile device, a method fordisplaying a screen thereof, a wearable device, a method for driving thesame, and a computer-readable recording medium. More particularly, thepresent disclosure relates to a mobile device where only a user wearinga wearable device, for example, Galaxy Gear™, is able to control aparticular operation, such as, an unlock operation of the mobile devicewhich requires enhanced security and usability to display a personalizedscreen, a method for displaying a screen thereof, a wearable device, amethod for driving the same, and a computer-readable recording medium.

BACKGROUND

Generally, a user authentication method is classified into aknowledge-based method, an ownership-based method, and acharacteristic-based method. The knowledge-based method includes anidentification (ID)/password as a representative example. Theownership-based method refers to directly presenting ID information of amedium that a user owns, such as a one-time password device (OTP) or anaccredited certificate. The characteristic-based method refers to amethod of performing authentication based on user characteristics. Thecharacteristic-based method includes fingerprint recognition, irisrecognition, voice recognition, etc., for example.

Such user authentication methods have been applied to diverse devicesand have come into wide use. For example, in case of a mobile devicesuch as a mobile phone, a user is able to set a password such asinputting certain numbers or drawing a certain pattern. In this case,the mobile device determines whether the user is entitled to use themobile device based on the input password.

However, in the user authentication method, a security vulnerabilityissue has been identified. For example, in case of pattern recognition,a password may be tracked based on a user trace which remains in ascreen.

In addition, a user is inconvenienced by releasing a lock state of amobile device several times, even though the user is entitled to use themobile device.

Furthermore, the method also has another security vulnerability issuethat exposes detailed information in a very private area such as a shortmessage service (SMS).

The above information is presented as background information only toassist with an understanding of the present disclosure. No determinationhas been made, and no assertion is made, as to whether any of the abovemight be applicable as prior art with regard to the present disclosure.

SUMMARY

Aspects of the present disclosure are to address at least theabove-mentioned problems and/or disadvantages and to provide at leastthe advantages described below. Accordingly, an aspect of the presentdisclosure is to provide a mobile device where only a user wearing awearable device, for example, Galaxy Gear™, is able to control aparticular operation, such as, an unlock operation of the mobile devicewhich requires enhanced security and usability to display a personalizedscreen.

In accordance with an aspect of the present disclosure, a mobile deviceoperating with a wearable device is provided. The mobile device includesa display configured to display a private screen which is personalizedto a user after authentication of the wearable device based on at leastone of a user state and an operational state of the mobile device and acontroller configured to control the display to display the privatescreen after the authentication.

When information received by the mobile device is present and the useris able to check the received information as the operational state, thecontroller is configured to control the display to display the receivedinformation as the private screen.

The controller may control the display to display a predetermined publicscreen to notify that the information is received before theauthentication of the wearable device.

When the information received by the mobile is present and the user isabsent as the operational state, the controller is configured to controlthe display to display the received information while the user is absentas the private screen.

When the information is generated in the mobile device as theoperational state, the controller is configured to control the displayto display the generated information as the private screen.

When the information received by the mobile device is not present anddetails related to an application pre-stored by the user being presentas the operational state, the controller is configured to control thedisplay to display the pre-stored application as the private screen.

The mobile device may further include a communication device configuredto perform local area communication to connect the mobile device to thewearable device and an auxiliary signal detector configured to detect anauxiliary signal. In response to the auxiliary signal being detected,the controller performs the authentication.

The communication signal may have a transmission distance shorter than atransmission distance of the auxiliary signal. In addition, theauxiliary signal may be a magnetic field.

The mobile device may further include a graphical user interface (GUI)generating unit configured to generate the public screen before theauthentication and generate the private screen after the authentication.

In accordance with another aspect of the present disclosure, a methodfor displaying a screen of a mobile device operating with a wearabledevice is provided. The method includes displaying a public screen whichis exposable to outside before authentication of the wearable devicebased on at least one of a user state and an operational state of themobile device and displaying a private screen which is personalized tothe user after the authentication of the wearable device.

When information received by the mobile device is present and the useris able to check the received information as the operational state, thedisplaying of the private screen comprises displaying the receivedinformation as the private screen.

The displaying of the public screen may include notifying that theinformation is received through the public screen before theauthentication of the wearable device.

When the information received by the mobile is present and the user isabsent as the operational state, the displaying of the private screencomprises displaying the received information while the user is absentas the private screen.

When the information is generated in the mobile device as theoperational state, the displaying of the private screen comprisesdisplaying the generated information as the private screen.

When the information received by the mobile device is not present anddetails related to an application pre-stored by the user is present asthe operational state, the displaying of the private screen comprisesdisplaying the pre-stored application as the private screen.

In accordance with another aspect of the present disclosure, acomputer-readable recording medium comprising a program for executing amethod for displaying a screen of a mobile device operating with awearable device is provided. The method includes displaying a publicscreen which is exposable to outside before authentication of thewearable device based on at least one of a user state and an operationalstate of the mobile device and displaying a private screen which ispersonalized to the user after the authentication of the wearabledevice.

In accordance with another aspect of the present disclosure, a wearabledevice is provided. The wearable device includes a communication deviceconfigured to perform local area communication to connect the wearabledevice with an adjacent mobile device and an auxiliary signal generatingunit configured to generate an auxiliary signal to be used to controlthe mobile device based on local area communication.

The auxiliary signal may have a transmission distance shorter than atransmission distance of a communication signal of the local areacommunication. In addition, the auxiliary signal generating unitgenerates a magnetic field as the auxiliary signal.

The wearable device may further include a storage configured to storefirst authentication information for authentication, a user interfaceconfigured to receive second authentication information from a user, anda controller configured to compare the first authentication informationand the second authentication information to determine an entitled userof the wearable device. In response to determining that the user is theentitled user, the controller may perform the local area communicationto control the mobile device.

The wearable device may further include a release detector configured todetect detachment of the wearable device. The communication device maytransmit release information on the release to the mobile device so asto stop a control operation of the mobile device.

The wearable device may further include a user interface configured toperform first authentication with respect to a user who uses thewearable device. The communication signal and the auxiliary signal areused for second authentication.

In accordance with another aspect of the present disclosure, a methodfor driving a wearable device is provided. The method includesperforming local area communication to connect the wearable device to anadjacent mobile device and generating an auxiliary signal to control themobile device along with a communication signal of the local areacommunication.

Other aspects, advantages, and salient features of the disclosure willbecome apparent to those skilled in the art from the following detaileddescription, which, taken in conjunction with the annexed drawings,discloses various embodiments of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certainembodiments of the present disclosure will be more apparent from thefollowing description taken in conjunction with the accompanyingdrawings, in which:

FIG. 1 is a view illustrating an authentication system according to afirst embodiment of the present disclosure;

FIG. 2 is a view illustrating an authentication system according to asecond embodiment of the present disclosure;

FIG. 3 is a view illustrating an authentication system according to athird embodiment of the present disclosure;

FIG. 4 is a view illustrating a predetermined operation of a mobiledevice according to an embodiment of the present disclosure;

FIGS. 5A and 5B are views provided to compare a screen beforeauthentication and a screen after the authentication of a wearabledevice according to an embodiment of the present disclosure;

FIG. 6 is a block diagram illustrating a structure of a portable deviceor a wearable device according to an embodiment of the presentdisclosure;

FIG. 7 is a block diagram illustrating a structure of an electronicdevice or a mobile device according to an embodiment of the presentdisclosure;

FIG. 8 is a flowchart provided to describe an operation of a wearabledevice according to the first embodiment of the present disclosure;

FIG. 9 is a flowchart provided to describe an operation of a wearabledevice according to the second embodiment of the present disclosure;

FIG. 10 is a flowchart provided to describe an operation of a wearabledevice according to the third embodiment of the present disclosure;

FIG. 11 is a flowchart provided to describe an operation of a mobiledevice according to the first embodiment of the present disclosure;

FIG. 12 is a flowchart provided to describe an operation of a mobiledevice according to the second embodiment of the present disclosure;

FIG. 13 is a flowchart provided to describe an operation of a mobiledevice according to the third embodiment of the present disclosure;

FIG. 14 illustrates views of a welcome screen according to an embodimentof the present disclosure; and

FIGS. 15A, 15B, 15C, and 15D are views provided to illustrate a welcomescreen according to an embodiment of the present disclosure.

Throughout the drawings, it should be noted that like reference numbersare used to depict the same or similar elements, features, andstructures.

DETAILED DESCRIPTION

The following description with reference to the accompanying drawings isprovided to assist in a comprehensive understanding of variousembodiments of the present disclosure as defined by the claims and theirequivalents. It includes various specific details to assist in thatunderstanding but these are to be regarded as merely exemplary.Accordingly, those of ordinary skill in the art will recognize thatvarious changes and modifications of the various embodiments describedherein can be made without departing from the scope and spirit of thepresent disclosure. In addition, descriptions of well-known functionsand constructions may be omitted for clarity and conciseness.

The terms and words used in the following description and claims are notlimited to the bibliographical meanings, but, are merely used by theinventor to enable a clear and consistent understanding of the presentdisclosure. Accordingly, it should be apparent to those skilled in theart that the following description of various embodiments of the presentdisclosure is provided for illustration purpose only and not for thepurpose of limiting the present disclosure as defined by the appendedclaims and their equivalents.

It is to be understood that the singular forms “a,” “an,” and “the”include plural referents unless the context clearly dictates otherwise.Thus, for example, reference to “a component surface” includes referenceto one or more of such surfaces.

FIG. 1 is a view illustrating an authentication system according to afirst embodiment of the present disclosure.

Referring to FIG. 1, an authentication system according to the firstembodiment of the present disclosure may include a portable device 100and an electronic device 110.

The portable device 100 refers to a supplementary device for controllingthe electronic device 110 and is configured as a mobile device that auser is able to carry. For example, the portable device 100 may includea mobile phone, such as, a smart phone, a Moving Picture Experts Groupphase 1 or phase 2 (MPEG-1 or MPEG-2) audio layer 3 (MP3) player, aplasma display panel (PDP), a personal digital assistant (PDA), and thelike. Alternatively, the portable device 100 may include an electroniccard such as a transportation card or a credit card. The portable device100 includes a communication module to perform communication accordingto certain general communication methods, such as, code divisionmultiple access (CDMA), wideband CDMA (WCDMA), etc., to perform localarea communication according to certain communication methods, such as,Bluetooth (BT), Wireless-Fidelity (Wi-Fi), etc., and to perform a searchfor the electronic device 110 in the vicinity. In some embodiments, theportable device 100 may be connected to the adjacent electronic device110. In response to the electronic device 110 entering an area where thelocal area communication is available, the portable device 100 mayconnect to the electronic device 110.

The portable device 100 may use a communication signal according to thelocal area communication as a main signal and may generate an auxiliarysignal having a transmission distance shorter than a transmissiondistance of the communication signal. Accordingly, the portable device100 includes an auxiliary signal generating unit for generating theauxiliary signal. Meanwhile, the auxiliary signal may be a magneticfield. A description of the auxiliary signal will be provided below.Besides the magnetic field, various signals may be used. For example, inresponse to the portable device 100 entering a predeterminedcommunication radius by the local area communication, the portabledevice 100 may emit infrared light in a predetermined form. In thiscase, the predetermined form refers to a protocol including the numberof flicker as well as simple emission.

Meanwhile, the electronic device 110 may perform a predeterminedoperation by using the communication signal, that is, a main signal, andthe auxiliary signal provided by the portable device 100. The electronicdevice 110 may be a door device installed on a vehicle or a door at ahouse or may be any suitable type of device such as an image displaydevice, etc. The image display device may include a laptop personalcomputer (PC), a television (TV), a desktop PC, a tablet PC, etc. Forexample, in response to the portable device 100 entering a radius of thelocal area communication, the electronic device 110 may perform thelocal area communication and perform first authentication to determinewhether a user is an entitled user and, in response to detecting theauxiliary signal, may additionally perform a second authentication todetermine whether the user is the entitled user. For example, theelectronic device 110 may store and use a user identification (ID) forfirst authentication. For second authentication, the electronic device110 may perform the authentication in response to a predetermined signalbeing detected, without storing any information. For example, theelectronic device 110 may detect a magnetic field or particular infraredlight emitted from the portable device 100 for the secondauthentication. When the electronic device 110 needs to determinewhether the infrared light is detected as a particular pattern, theelectronic device 110 may pre-store pattern information.

Assuming that the electronic device 110 is a vehicle, a door of thevehicle may be unlocked in response to the first authentication, thatis, a BT signal, and an ignition of the vehicle may be turned on inresponse to the second authentication, that is, the detecting of theauxiliary signal. That is, the ignition of a vehicle is related tocrucial safety issue, and thus, the ignition should be turned on when auser is sufficiently close to a steering wheel. In addition, assumingthat the electronic device 110 is a TV, the TV may be set so as to beinaccessible to broadcast content for adults before the secondauthentication is performed. In this case, a lock state of the TV may bereleased automatically or an access limit to the broadcast content foradults, for example, a particular channel, may be released only when theportable device 100 that an adult owns accesses the TV. Such functionmay increase user convenience significantly.

Hereinafter, an authentication system will be described in details withreference to the wearable device and the mobile device in FIG. 2.

FIG. 2 is a view illustrating an authentication system according to asecond embodiment of the present disclosure.

Referring to FIG. 2, an authentication system according to the secondembodiment of the present disclosure includes a wearable device 200 anda mobile device 210.

In this case, unlike the portable device 100 in FIG. 1, the wearabledevice 200 requires a user to wear the wearable device 200, that is,there must be contact between the user and the wearable device 200, andthus, the wearable device 200 may have improved security. The wearabledevice 200 may include a necklace, an electronic watch, etc., as well asa wristwatch-type PC, for example, a Galaxy Gear™ as illustrated in FIG.2. Such devices may use a magnetic field to further strengthen thesecurity. A magnetic force (or magnetism) of a magnetic field may becontrolled by changing a magnetic substance, and thus, may be simpler toimplement than the infrared light.

For example, in response to the wearable device 200 entering thecommunication radius for performing the local area communication withthe mobile device 210, the wearable device 200 may perform a connectionoperation using, for example, Bluetooth Low Energy (BLE). The wearabledevice 200 includes a magnetic field generating unit (not shown)configured to generate a magnetic field as the auxiliary signal, and themagnetic field may be configured to be recognized within approximately10 centimeters (cm). The magnetic field generating unit may be mountedon a strap of the wearable device 200.

The wearable device 200 may determine whether the user wears thewearable device 200, and in response to determining that that the userremoves of the wearable device 200, the wearable device 200 may transmitrelease information to the mobile device 210. For example, in case ofthe wearable device 200 having the magnetic field generating unitmounted on a side of the strap and a magnetic field detector mounted onthe other side of the strap, in response to the magnetic field not beingdetected by the magnetic field detector after the user wears thewearable device 200, the wearable device 200 may determine that thewearable device 200 has been removed. Alternatively, if the wearabledevice includes a light emitter mounted on a side of the strap and alight receiver mounted on the other side of the strap, in response toany light not being received by the light receiver after the user wearsthe wearable device 200, the wearable device 200 may determine that thewearable device 200 has been removed. In this case, the light emittermay be a light emitting diode (LED).

The mobile device 210 controls a predetermined operation by using alocal area communication signal and an auxiliary signal received fromthe wearable device 200. That is, in response to the wearable device 200entering the communication radius where the local area communication isavailable, the mobile device 210 determines whether the auxiliary signalis detected from the wearable device 200. In response to detecting theauxiliary signal, the mobile device 210 may determine that the wearabledevice 200 is proximate to the mobile device 210, and thus, mayautomatically release a lock screen or may control various predeterminedoperations.

For example, in addition to an auto-release operation with respect to alock screen, the mobile device 210 may control to display information ona private area in a screen. That is, when the authentication by theauxiliary signal is not performed, the mobile device 210 may brieflydisplay a state (e.g., a state where there is an incoming call or astate where a text message is arrived, etc.) in a public area which maybe publically observable. If a user wears the mobile device 210, thewearable device 200 may display a screen that is not easily observed byothers (i.e., the screen is deemed to be private). In addition, themobile device 210 may perform an operation for controlling a graphicaluser interface (GUI) screen by using an auxiliary signal according tovarious methods. The operation will be described below in furtherdetails.

In the above-described operation, in response to determining that themagnetic field is not detected from the wearable device 200 or inresponse to receiving the release information notifying that the userhas removed the wearable device 200, the mobile device 210 may stop acontrol operation with respect to a predetermined operation of themobile device 210.

FIG. 3 is a view illustrating an authentication system according to athird embodiment of the present disclosure.

Referring to FIG. 3, an authentication system according to the thirdembodiment is different from the authentication system in FIG. 2 in thatthe wearable device 200 requests additional user authentication.

In response to a user initially wearing the wearable device 200, thewearable device 200 requests an input of a particular pattern, apassword, or a fingerprint for the user authentication to add additionalmeasures as compared with the authentication system in FIG. 2. Once theuser authentication is completed, the wearable device 200 does notrequest additional input of the pattern, password, or fingerprint againuntil the wearable device 200 is detached from the user. In response tothe wearable device 200 being detached from the user, the wearabledevice 200 may reset the pattern, password, or fingerprint information.That is, after removing the wearable device 200, the wearable device 200may request the pattern, password, or fingerprint when the wearabledevice 200 is worn again.

More particularly, in response to the first authentication beingperformed through an interface with a user (or before the authenticationby a magnetic field is performed according to the local areacommunication), the wearable device 200 may display a user interface forthe first authentication. Upon completion of the first authentication,the wearable device 200 determines whether an auxiliary signal, such as,a magnetic field, is detected and controls a predetermined operation ofthe mobile device 210.

FIG. 4 is a view illustrating a predetermined operation of a mobiledevice according to an embodiment of the present disclosure.

Referring to FIG. 4, the predetermined operation of the mobile device210 may include various operations. For example, as described above, thepredetermined operation may include releasing a lock screen of themobile device 210 or displaying a different GUI screen before theauthentication by an auxiliary signal and a GUI screen after theauthentication by an auxiliary signal as illustrated in FIG. 4. Herein,a screen 410 is displayed before the authentication and belongs to ascreen of the public area. The screen 410 may be referred to as ashowcase screen that illustrates a showcase that anyone can see.Meanwhile, a screen 420 is a screen after the authentication by anauxiliary signal and belongs to a screen of the private area. The screen420 may be referred to as a welcome screen.

For example, the mobile device 210 may divide a lock screen into ashowcase screen and a welcome screen and vary a level of informationaccording to the authentication. That is, the lock screen may berealized as a screen structure consisting of a showcase screen, awelcome screen, and a home screen, not the existing screen structureconsisting of a lock screen and a home screen. In the showcase screenwhich belongs to the public area, a content registered by a user, suchas, a picture, a moving image, and music, may be played back before theauthentication. In response to an incoming call or text message, theshowcase screen displays only a notification and does not displaydetails on the incoming call or text message. By contrast, the welcomescreen may display details on an incoming event or important informationfor the user after the authentication process. In addition, after theauthentication process by the auxiliary signal, the mobile device 210may enter the welcome screen automatically and additionally displaypersonal information.

The showcase (or lock screen) is a customizable screen that is preparedaccording to the user's preferences. That is, in the showcase screen, anowner of the mobile device 210 is able to actively express theirpreferences. A photo showcase may generate a slide show using preferredpictures of a gallery. The showcase screen may control the existingpattern-input user interface (UI) and use a full screen so that anunconstrained interaction is performed. Alternatively, the showcasescreen may only display a notification regarding an incoming call (ortelephone conversation) or an incoming text message. By contrast, thewelcome screen is a screen presented to the owner of the mobile device210 after authentication and providing the owner with informationactively. The welcome screen displays diverse additional information inaddition to a simple notification. In addition, the welcome screen maybe a screen in which information is temporarily stored for a reminder.In response to any particular notification information not beingpresent, the mobile device 210 may enter the welcome screen immediately.

FIGS. 5A and 5B are views provided to compare a screen beforeauthentication and a screen after the authentication of a wearabledevice according to an embodiment of the present disclosure.

Referring to FIG. 5A, a home screen 510 (or a lock screen) according toan embodiment of the present disclosure is illustrated. According to anembodiment of the present disclosure, only the showcase screen may bedisplayed before the authentication of the wearable device, asillustrated in screen 520. That is, only the notification regarding theincoming call or text message may be provided. Referring to FIG. 5B, ashowcase screen 530 is illustrated. In this process, in response to theauthentication being performed by the wearable device 200, for example,the mobile device 210 may display the welcome screen 540.

FIG. 6 is a block diagram illustrating a structure of a portable deviceor a wearable device according to an embodiment of the presentdisclosure.

Referring to FIG. 6, and with reference to FIG. 2 to facilitateexplanation, the wearable device 200 according to an embodiment of thepresent disclosure includes a communication interface 600, a userinterface 610, a controller 620, an auxiliary signal generating unit630, a release detector 640, and a storage 650.

Herein, including a part or all of components signifies that a part ofthe components, such as the release detector 640 or the storage 650, isomitted or a part of the components, such as, the release detector 640,is integrated with the auxiliary signal generating unit 630. In thiscase, the illustrated wearable device 200 includes only some componentsto facilitate understanding of the embodiment of the present disclosure.

The communication interface 600 performs communication with the mobiledevice 210. More particularly, the communication interface 600 performsthe local area communication with the mobile device 210 according to thecommunication method such as BT, Wi-Fi, etc. For example, a BT signalhas a communication radius of 1.5 meter (m), and an approach between thewearable device 200 and the mobile device 210 may be determined througha signal strength (received signal strength indicator (RSSI)). Thecommunication interface 600 may also perform the communication accordingto the communication method such as CDMA or WCDMA. The wearable device200 and the mobile device 210 may recognize each other bytransmitting/receiving a device ID.

The user interface 610 may include a button input unit and/or a display.The display may display information or image data, and in response tothe display being realized as a touch screen, a user may perform anauthentication through the button input unit or the display. Forexample, the user is able to input a password by using the button inputunit or button keys displayed in the display or by drawing a certainpattern based on graphical objects displayed in the touch screen,thereby authenticating that the user is the entitled user of thewearable device 200. Accordingly, the user interface 610 providesauthentication information through an interface with the user.

The controller 620 may control a part or all of the communicationinterface 600, the user interface 610, the auxiliary signal generatingunit 630, the release detector 640, and the storage 650 of the wearabledevice 200. For example, the controller 620 may be connected to themobile device 210 which is determined to be proximate to the wearabledevice 200 through the communication interface 600. The controller 620may also compare the authentication information received through theuser interface 610 with information stored in the storage 650 todetermine whether the user is the entitled user. In addition, thecontroller 620 may control to transmit a detected result of the releasedetector 640 to the mobile device 210 through the communicationinterface 600.

In addition, the controller 620 may further include a demultiplexer (notshown), a decoder (not shown), a scaler (not shown), and the like sothat the wearable device 200 operates as an image processor. Thedemultiplexer may divide an inputted image signal into a video signal,an audio signal, and additional information. The decoder may decode anencoded video signal and audio signal. The scaler may perform anoperation such as resolution conversion, etc.

The auxiliary signal generating unit 630 may generate a magnetic fieldor the infrared light as an auxiliary signal. For example, in case of amagnetic field, the auxiliary signal generating unit 630 may be realizedin the manner of installing a magnetic substance on the strap of thewearable device 200. In this case, the auxiliary signal generating unit630 may adjust a diffusion length of the magnetic field by changing aform of the magnetic characteristics. Meanwhile, the infrared light maybe an LED. For example, in response to determining that the wear of thewearable device 200 is performed through the release detector 640, theauxiliary signal generating unit 630 may emit the infrared light.

The release detector 640 may detect whether the wearable device 200 isattached to a user. In response to a magnetic field not being detectedfrom the wearable device 200, the mobile device 210 may determine thatthe wearable device 200 is not attached to the user. However, in orderto enhance accuracy on the security, it is desirable to detect theattachment or detachment through the release detector 640. For example,the release detector 640 may include a signal detector for detecting amagnetic field provided by the auxiliary signal generating unit 630disposed in a certain side or include a light receiver for receiving theemitted infrared light. Accordingly, in response to the magnetic fieldnot being detected by a signal detector on a side that opposes thecertain side or in response to the infrared light not being received bythe light receiver, the release detector 640 may determine that thewearable device 200 is detached and transmit the release information tothe mobile device 210. The mobile device 210 may stop the predeterminedoperation according to the release information.

The storage 650 may temporarily store information or various image dataprocessed by the controller 620 and may also store the authenticationinformation for performing the authentication of the wearable device200. In this case, the authentication information may be a password,pattern information, or fingerprint information. In addition, inresponse to a request from the controller 620, the storage 650 mayoutput the stored authentication information.

FIG. 7 is a block diagram illustrating a structure of an electronicdevice or a mobile device according to an embodiment of the presentdisclosure.

Referring to FIG. 7, and with reference to FIG. 2 to facilitateexplanation, the mobile device 210 according to an embodiment of thepresent disclosure includes a part or all of a communication interface700, a user interface 710, a controller 720, an auxiliary signaldetector 730, a GUI generating unit 740, and a storage 750.

Herein, including a part or all of components signifies that a part ofthe components, such as, the GUI generating unit 740 and/or the storage750, is omitted or a part of the components, such as, the GUI generatingunit 740 is integrated with other components such as the controller 720.In this case, the mobile device 210 includes all of the components forbetter understanding of the embodiment of the present disclosure.

In response to the wearable device 200 being searched in the vicinity,the communication interface 700 may perform communication to connect themobile device 210 with the wearable device 200. For example, in responseto device ID information being preset with respect to the certainwearable device 200, the mobile device 210 may be connected to thewearable device 200 automatically through the local area communication.To facilitate this connection, the communication interface 700 mayinclude a local area communication module and may perform the CDMAcommunication or the WCDMA communication. In addition, in response tothe release information notifying that the wearable device 200 isdetached from the user, the communication interface 700 may receive andprocess the release information.

The user interface 710 may include a button input unit and/or a display.For example, in response to the display being realized as a touchscreen, the button input unit may be omitted. The mobile device 210 mayperform various operations, such as, touch, flip, tap, etc., though aninterface with the user interface 710.

The controller 720 may control overall operations of the communicationinterface 700, the user interface 710, the auxiliary signal detector730, the GUI generating unit 740, and the storage 750 of the mobiledevice 210. For example, in response to an auxiliary signal, which isgenerated by the wearable device 200, being detected by the auxiliarysignal detector 730, the controller 720 may perform a predeterminedoperation. In this case, as described above, the predetermined operationmay include various operations of unlocking a lock screen, processing acontent including a gallery, etc. For example, in response to theauxiliary signal not being detected, the controller 720 controls the GUIgenerating unit 740 to display a public screen, such as a showcasescreen, as the predetermined operation. In response to the auxiliarysignal being detected, the controller 720 may display a private screensuch as a welcome screen. In this process, in response to receiving therelease information indicating that the wearable device 200 is detached,the controller 720 may stop the operation.

The auxiliary signal detector 730 may detect a magnetic field orinfrared light as an auxiliary signal. In this case, the magnetic fieldhas a transmission distance shorter than a transmission distance of acommunication signal according to the local area communication, and theauxiliary signal detector 730 may include a magnetic sensor fordetecting a magnetic field or may include a hall sensor. The infraredlight may have a transmission distance longer than the transmissiondistance of the communication signal according to the local areacommunication, but in response to the infrared light being detected, theauxiliary signal detector 730 may include an infrared light receivingsensor. For example, in response to the magnetic field being detectedvia the auxiliary signal detector 730, the auxiliary signal detector 730may notify that the magnetic field is detected to the controller 720.Accordingly, the controller 720 may authenticate that the user is theentitled user of the mobile device 210 and perform the predeterminedoperation.

The GUI generating unit 740 may display GUI screens according to controlof the controller 720. For example, the GUI generating unit 740 maygenerate and display a public screen, that is, the a showcase screen, tobe displayed before the authentication of the auxiliary signal, and maygenerate and display a private screen, that is, the welcome screen afterthe authentication of the auxiliary signal. In addition, the GUIgenerating unit 740 may be involved in an operation of generating ofvarious screens. Such operations may be performed by executing a relatedapplication, for example.

The storage 750 may temporarily store various information and/or imagedata processed in the mobile device 210. In addition, in response toreceiving an incoming text message or an incoming call according to acall request, the storage 750 may pre-store the showcase screen, whichis generated by the GUI generating unit 740, and provide the pre-storedshowcase screen. The storage 750 may also pre-store the welcome screenand provide the welcome screen in response to a request of thecontroller 720.

FIG. 8 is a flowchart provided to describe an operation of a wearabledevice according to the first embodiment of the present disclosure.

Referring to FIG. 8, and with reference to FIG. 2 to facilitateexplanation, the wearable device 200 performs the local areacommunication to be connected to the mobile device 210 in the vicinityat operation S800. The wearable device 200 may search for the mobiledevice 210, which is recognized in the vicinity, and perform an initialconnection operation according to a user selection, and once the mobiledevice 210 is recognized, the wearable device 200 may be connected tothe mobile device 210 automatically.

In response to the mobile device 210 being connected to the wearabledevice 200, the wearable device 200 generates an auxiliary signal to beused along with a local area communication signal to control the mobiledevice 210 at operation S810. It may be seen that such signal may begenerated at all times, but not limited thereto. In some examples, thewearable device 200 may generate the auxiliary signal in response todetermining that two devices are interconnected by the local areacommunication. The operation of generating an auxiliary signal has beendescribed above, and thus, the detailed description is omitted.

FIG. 9 is a flowchart provided to describe an operation of a wearabledevice according to the second embodiment of the present disclosure.

Referring to FIG. 9, and with reference to FIG. 2 to facilitateexplanation, operating the wearable device 200 according to the secondembodiment of the present disclosure is different from the operation ofdriving the wearable device 200 in FIG. 8 in that the userauthentication is also performed.

According to the operation of driving the wearable device 200 in FIG. 9,the wearable device 200 may store the authentication information (e.g.,a password, pattern information, and fingerprint information, etc.) atoperation S900.

Subsequently, the wearable device 200 may compare the storedauthentication information with information inputted through the userinterface and perform an authentication operation at operation S910. Inaddition, the wearable device 200 performs user authentication withrespect to the wearable device 200. This operation is to provideadditional security and may be a first authentication process in theembodiment of the present disclosure.

Meanwhile, operation S920 is similar to the descriptions related tooperations S800 and S810 disclosed above with reference to FIG. 8, andthus, the detailed description is omitted.

FIG. 10 is a flowchart provided to describe an operation of a wearabledevice according to the third embodiment of the present disclosure.

Referring to FIG. 10, and with reference to FIG. 2 to facilitateexplanation, the wearable device 200 according to the third embodimentof the present disclosure determines whether it becomes detached fromthe user while performing the operations in FIGS. 8 and 9 at operationS1000. For example, a magnetic field generating unit or an infraredlight detector may be disposed on a strap of the wearable device 200,and a magnetic field detector or an infrared light receiver may bedisposed on the other strap. In response to a magnetic field or infraredlight not being detected by the magnetic field detector or the infraredlight receiver, the wearable device 200 may detect detachment.

In response to detachment of the wearable device 200, the wearabledevice 200 may transmit the release information to the mobile device 210so that the mobile device 210 stops the predetermined operation atoperation S1010. Accordingly, the mobile device 210 may stop aparticular control operation.

FIG. 11 is a flowchart provided to describe an operation of a mobiledevice according to the first embodiment of the present disclosure.

Referring to FIG. 11, and with reference to FIG. 2 to facilitateexplanation, the mobile device 210 according to the first embodiment ofthe present disclosure performs the local area communication to beconnected to the wearable device 200 in the vicinity at operation S1100.That is, in response to the ID information being preset, the mobiledevice 210 performs the local area communication and performs theconnection operation.

Subsequently, the mobile device 210 detects an auxiliary signalgenerated in the wearable device 200, which is a communication signalfrom signals associated with the local area communication at operationS1110. As described above, the auxiliary signal may be a magnetic fieldor infrared light.

In response to the auxiliary signal being detected, the mobile device210 performs a predetermined operation at operation S1120. That is, themobile device 210 may control to release a lock screen of the mobiledevice 210 or expose a screen which belongs to a private area.

FIG. 12 is a flowchart provided to describe an operation of a mobiledevice according to the second embodiment of the present disclosure. InFIG. 12, it is assumed that an auxiliary signal is a magnetic field.

Referring to FIG. 12, and with reference to FIG. 2 to facilitateexplanation, in response to the wearable device 200 not being locatedwithin a communication radius (e.g., 10 m) where communication betweenthe mobile device 210 and the wearable device 200 is available, themobile device 210 may determine that the wearable device 200 is outsidethe communication radius at operation S1200. In response to determiningthat wearable device 200 is outside of the communication radius, themobile device 210 may determine that the wearable device 200 is in aloss state at operation S1210.

In response to the wearable device 200 being located within thecommunication radius, the mobile device 210 determines whether the localarea communication can be performed at operation 1220. In response todetermining that the local area communication cannot be performed (e.g.,the wearable device is not within 1.5 m), the mobile device 210 maydetermine that the wearable device is in a long-range state at operationS1230.

In response to determining that the wearable device 200 is located inthe communication radius and the local area communication can beperformed (e.g., within 1.5 m), the mobile device 210 measures amagnetic field at operation S1240.

If the magnetic field cannot be measured (e.g., the wearable device isnot within 10 cm), the mobile device 210 determines that the wearabledevice 200 is in a close-range state at operation S1250. In response tothe magnetic field being measured, the mobile device 210 determines thatthe situation as the adhering state at operation S1260. For example, adistance of the adhering state may be set to be 10 cm, according to anembodiment of the present disclosure.

In response to the determining that the wearable device 200 is in theadhering state, the mobile device 210 may perform a predeterminedoperation according to the adhering state at operation S1270. Asdescribed above, the mobile device 210 may release a lock screen of themobile device 210 or expose a screen which belongs to the private area.

Meanwhile, according to the sequential states illustrated in FIG. 12,the mobile device 210 may perform various control operations. Thecontrol operations may be schematically described as shown in Table 1below. In Table 1, the mobile device 210 is referred to as ‘mobile,’ andthe wearable device 200 is referred to as ‘gear’.

TABLE 1 Definition of device connection Examples of predetermined Userstate state operation Lock screen 1) Mobile is lost No method forreleasing lock (contact information of an owner is necessary) 2) Mobileand gear are located Release lock by a drag operation, far from eachother not a pattern or fingerprint recognition 3) Mobile and gear arelocated Release lock by a drag operation, close to each other not apattern or fingerprint recognition 4) Mobile and gear adhere to Lock isreleased immediately as each other soon as a user holds a deviceNotification 1) Mobile is lost Display no notification in lock (incomingscreen (Answering call is call/text possible) message, etc.) 2) Mobileand gear are located Do not display lock screen and far from each otherplay back sound. Display notification in gear. 3) Mobile and gear arelocated Display lock screen and play close to each other back sound.Display notification in gear. 4) Mobile and gear adhere to Display lockscreen and play each other back sound. Do not display notification ingear. Gallery 1) Mobile is lost Display general picture (defaultthumbnail list application) 2) Mobile and gear are located Displaygeneral picture far from each other thumbnail list 3) Mobile and gearare located Display general picture close to each other thumbnail list4) Mobile and gear adhere to Provide affordance of enabling each otheruser to access to hidden pictures → See pictures after fingerprintrecognition (highest security level)

Referring to Table 1, the mobile device 210 may provide differentexperiences depending upon a user and a device connection state.Accordingly, user-accessible information and functions may be provideddepending upon a state, and the security and accessibility may beenhanced. Accordingly, natural user experience (UX) may be providedaccording to user authentication.

FIG. 13 is a flowchart provided to describe an operation of a mobiledevice according to the third embodiment of the present disclosure.

Referring to FIG. 13, and with reference to FIG. 2 to facilitateexplanation, the mobile device 210 according to the third embodiment ofthe present disclosure may perform the predetermined operations as inFIGS. 11 and 12 at operation S1300. In this case, the predeterminedoperation may include various operations using content such as agallery.

Subsequently, the mobile device 210 may receive release information fromthe wearable device 200 indicating detachment of the wearable device200, while performing the predetermined operations at operation 1310. Inanother example, the mobile device 200 may be capable of autonomouslydetermining the detachment of the wearable device 200 at operationS1310.

In response to determining that the wearable device 200 is detached, themobile device 210 may stop the control operation that is related to theprivate area or is preset at operation S1320.

FIG. 14 illustrates views of a welcome screen according to an embodimentof the present disclosure.

FIGS. 15A, 15B, 15C, and 15D are views provided to illustrate a welcomescreen according to an embodiment of the present disclosure.

Referring to FIGS. 14 and 15A, 15B, 15C, and 15D, after theauthentication is performed in a lock screen by the wearable device 200,the mobile device 210 displays a personalized home screen such as awelcome screen 1400 according to a state of the mobile device 210 (i.e.,an operational state), rather than directly entering a home screen.

In this case, the welcome screen 1400 enables an owner to access toinformation quickly and may be a greeting screen for recognizing theowner of the mobile device 210 and actively providing the owner withinformation. For example, the welcome screen 1400 may be a briefingscreen that is displayed when a user holds the mobile device 210 todisplay information that needs to be checked, such as notificationsaccumulated during an unused time. In the welcome screen 1400, the useris able to check or delete the notifications or execute a functionwithout entering an application. In addition, the welcome screen 1400may provide an activity log accumulated in the mobile device 210 and aconnected device and a simple control with respect to a device. A userstate includes various states of a user, such as user absence, etc. Adevice state includes various states of a device, such as, a state as towhether a notification is received from outside like an incoming call ortext message or a state as to whether the notification is to execute anapplication stored in the mobile device 210.

A screen 1410 illustrates an operation of displaying a showcase screenbefore the authentication by the wearable device 200 in response to anincoming call of text message. After the authentication of the wearabledevice 200, the mobile device 210 displays the welcome screen. Inresponse to an incoming call, the welcome screen may display a caller'snumber. In response to a telephone directory including a namecorresponding to the caller's number, the welcome screen may display thename. Meanwhile, the wearable device 200 is a device that only aparticular user is able to wear in order to secure the privacy and thesecurity. In this regard, the wearable device 200 may display thecaller's number, the caller's name, or detailed contents of the textmessage, which is the same as the details in the welcome screen, eventhough the authentication of the mobile device 210 is not yet performed.

In response to a missed call, unchecked message, unchecked scheduleinformation, or update information on a social networking service (SNS),that is, in response to the wearable device 200 performingauthentication with respect to a notification received from outside bythe communication when a user is absent, as illustrated in screen 1420and a screen illustrated in FIG. 15B, the mobile device 210 may displaydetails on the missed call, message, schedule information, and SNSupdate information in the welcome screen. That is, as soon as the userof the wearable device 200 holds the mobile device 210, the mobiledevice 210 may display the welcome screen. In this case, the displayeddetails may be caller information such as a telephone number or name. Inresponse to the user touching an unchecked message, the mobile device210 may display detailed contents of a received/sent message in thescreen, as illustrated in screen 1430.

In addition, in response to no information and in response toinformation on an application (hereinafter referred to as ‘App’) storedby the user after the authentication of the wearable device 200, themobile device 210 may display the information on the App as the welcomescreen as illustrated in screen 1440. In response to the user executingthe App, for example, music, the mobile device 210 may play back themusic immediately, but in response to the user not executing the App,the mobile device 200 may display screen 1450.

In addition, in connection with the certain accumulated notificationssuch as SNS notifications, the user of the mobile device 210 may checkand delete the notifications. In connection with a notification whichrequires a reminder, the user may store the related information. Thestored information may be displayed by a flip operation of the user.Screen 1450 illustrates an example of displaying App-related informationstored according to the above operation in the welcome screen.

In response to the App-related information being information accordingto an execution of an App stored in the mobile device 210, the mobiledevice 210 may display the App-related information as the Welcome screenas illustrated in FIGS. 15C and 15D. That is, in response to an App(S-Health™) for checking a physical condition of a user periodicallybeing stored in the mobile device 210, the mobile device 210 may displaya checked result as the welcome screen after the authentication of thewearable device 200. In response to an App for controlling a TV beingstored in the mobile device 210 and the user holding the mobile device210 in the vicinity of a TV while wearing the wearable device 200, themobile device 210 may display a screen as illustrated in FIG. 15D as thewelcome screen. In this case, the watch on screen belongs to a kind ofcontrol screen.

As described above, the welcome screen according to the embodiment ofthe present disclosure may be realized in various forms, and in responseto the authentication of the wearable device 200 being performed, mayrecognize an owner and display desired information to the owneractively.

Meanwhile, although it has been described that entire componentsconstituting the various embodiments of the present disclosure arecombined as a single component or operate by being combined with eachother, the various embodiments are not limited thereto. That is, unlessit goes beyond the purpose of the various embodiments of the presentdisclosure, the entire components may be selectively combined as one ormore components. In addition, each of the entire components may beimplemented as independent hardware. Alternatively, a part or all of thecomponents may be selectively combined and implemented as a computerprogram having a program module which performs a part or all functionscombined in one or a plurality of pieces of hardware. Codes and codesegments constituting the computer program may be easily derived by aperson having ordinary skill in the art. The computer program may bestored in a non-transitory computer readable recording medium and readand executed by a computer thereby implementing the various embodimentsof the present disclosure.

In this case, the non-transitory computer readable recording mediumrefers to a medium which may store data permanently or semi-permanentlyrather than storing data for a short time such as a register, a cache,and a memory and may be readable by an apparatus. As an example, theabove-described various applications and programs may be stored in thenon-transitory computer readable recording medium such as a compact disc(CD), a digital versatile disc (DVD), a hard disk, a Blu-Ray™ Disc, auniversal serial bus (USB), a memory card, a read-only memory (ROM), andthe like, and provided therein.

While the present disclosure has been shown and described with referenceto various embodiments thereof, it will be understood by those skilledin the art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the present disclosure asdefined by the appended claims and their equivalents.

What is claimed is:
 1. A mobile device comprising: a display; and atleast one processor configured to: receive information, determinewhether a wearable device is proximate to the mobile device, in responseto determining that the wearable device is proximate to the mobiledevice, control the display to display a private screen comprising theinformation, and in response to determining that the wearable device isnot proximate to the mobile device, control the display to display apublic screen comprising a notification that the information isreceived.
 2. The mobile device of claim 1, wherein the at least oneprocessor is further configured to: determine whether the wearabledevice is authenticated based on authentication information input intothe wearable device, in response to determining that the wearable deviceproximate to the mobile device is authenticated, control the display todisplay the private screen, and in response to determining that thewearable device proximate to the mobile device is not authenticated,control the display to display the public screen.
 3. The mobile deviceof claim 2, further comprising: a communication interface configured toconnect the mobile device to the wearable device; and an auxiliarysignal detector configured to detect an auxiliary signal generated bythe wearable device, wherein, in response to the auxiliary signal beingdetected, the at least one processor is further configured to determinethe wearable device as the authenticated wearable device.
 4. The mobiledevice of claim 3, wherein a transmission distance of a communicationsignal generated by the communication interface is shorter than atransmission distance of the auxiliary signal.
 5. The mobile device ofclaim 4, wherein the auxiliary signal includes a magnetic field.
 6. Themobile device of claim 1, wherein the information is received while auser using the wearable device is absent from the mobile device.
 7. Themobile device of claim 1, further comprising: a GUI generating unitconfigured to generate the public screen and generate the privatescreen.
 8. A method for controlling a mobile device, the methodcomprising: receiving information; determining whether a wearable deviceis proximate to the mobile device; in response to determining that thewearable device is proximate to the mobile device, displaying a privatescreen comprising the information; and in response to determining thatthe wearable device is not proximate to the mobile device, displaying apublic screen comprising a notification that the information isreceived.
 9. The method of claim 8, further comprising: determiningwhether the wearable device is authenticated based on authenticationinformation input into the wearable device; in response to determiningthat the wearable device proximate to the mobile device isauthenticated, displaying the private screen; and in response todetermining that the wearable device proximate to the mobile device isnot authenticated, displaying the public screen.
 10. The method of claim9, further comprising: in response to detecting an auxiliary signalgenerated by the wearable device, determining the wearable device as theauthenticated wearable device.
 11. The method of claim 10, wherein atransmission distance of a communication signal generated by acommunication interface of the mobile device is shorter than atransmission distance of the auxiliary signal.
 12. The method of claim11, wherein the auxiliary signal includes a magnetic field.
 13. Themethod of claim 8, wherein the information is received while a userusing the wearable device is absent from the mobile device.
 14. Anon-transitory computer-readable recording medium comprising a programfor executing a method for controlling a mobile device, the methodcomprising: receiving information; determining whether a wearable deviceis proximate to the mobile device; in response to determining that thewearable device is proximate to the mobile device, displaying a privatescreen comprising the information; and in response to determining thatthe wearable device is not proximate to the mobile device, displaying apublic screen comprising a notification that the information isreceived.
 15. The method of claim 14, further comprising: determiningwhether the wearable device is authenticated based on authenticationinformation input into the wearable device; in response to determiningthat the wearable device proximate to the mobile device isauthenticated, displaying the private screen; and in response todetermining that the wearable device proximate to the mobile device isnot authenticated, displaying the public screen.
 16. The method of claim15, further comprising: in response to detecting an auxiliary signalgenerated by the wearable device, determining the wearable device as theauthenticated wearable device.
 17. The method of claim 16, wherein atransmission distance of a communication signal generated by acommunication interface of the mobile device is shorter than atransmission distance of the auxiliary signal.
 18. The method of claim17, wherein the auxiliary signal includes a magnetic field.
 19. Themethod of claim 14, wherein the information is received while a userusing the wearable device is absent from the mobile device.
 20. Themobile device of claim 1, wherein the private screen comprises a pictureof a contact, a name of the contact, and contact information to initiatecommunication with the contact, and wherein the public screen comprisesa picture of the contact and omits any text to identify the contact.