Electronic apparatus and method of selectively applying security mode in mobile device

ABSTRACT

A mobile device includes a user interface having a display panel and a touch panel, a network interface to communicate with an external network, a memory to store a password and an authorized user, a functional unit to sense a user and a motion of the mobile device during a power saving mode, and a control unit to control operations of the mobile device, and to perform an unlocking operation during the power saving mode to unlock the mobile device. The unlocking operation includes a motion detection process of sensing the motion of the mobile device, a user identification process of determining that a sensed user represents the authorized user, in response to the sensed motion of the motion detecting process, and an unlocking process of unlocking the mobile device according to the determination of the user identification process.

CROSS-REFERENCE TO RELATED APPLICATIONS

This U.S. non-provisional patent application is a divisional applicationunder 35 U.S.C. § 120 of a U.S. non-provisional application Ser. No.16/581,558 filed Sep. 24, 2019, Now U.S. Pat. No. 11,184,473, which is adivisional application of a U.S. non-provisional application Ser. No.16/402,275 filed May 3, 2019, now U.S. Pat. No. 10,511,975, which is adivisional application of a U.S. non-provisional application Ser. No.16/166,078 filed Oct. 20, 2018, now U.S. Pat. No. 10,299,133, which is adivisional application of a U.S. non-provisional application Ser. No.16/127,286 filed on Sep. 11, 2018, now U.S. Pat. No. 10,149,164, whichis a continuation application of a U.S. non-provisional application Ser.No. 15/984,375 filed on May 20, 2018, now U.S. Pat. No. 10,085,151 whichis a continuation application of a U.S. non-provisional application Ser.No. 15/972,135 filed on May 5, 2018, now U.S. Pat. No. 10,111,098, whichis a divisional application of a U.S. non-provision patent applicationSer. No. 15/853,870 filed on Dec. 25, 2017, now U.S. Pat. No. 9,973,929,which is a continuation application of U.S. non-provisional applicationSer. No. 15/297,069, filed on Oct. 18, 2016, now U.S. Pat. No.10,064,056, which is a continuation-in-part application of U.S.non-provisional patent application Ser. No. 14/181,728, filed on Feb.17, 2014, now U.S. Pat. No. 9,509,822, in the U.S. Patent and TrademarkOffice, the entire contents of which are hereby incorporated byreference.

BACKGROUND OF THE INVENTIVE CONCEPT 1. Field of the Inventive Concept

The present inventive concept relates to an electronic apparatus andmethod of selectively applying a security mode in a mobile device.

2. Description of the Related Art

A conventional electronic mobile device, for example, a cellular phone,is set to a security mode or a non-security mode. When the set securitymode is set, a user has to input a security code by enter a password, animage, or a geniture though a user interface unit. That is, a user hasto input the security code every time to access the mobile device setwith the security mode.

Even if a user is in a security safe zone, the user has to enter thesecurity code previously set in the security mode. In order for the userto avoid inconvenience in the security safe zone, a user has to disablethe security mode to avoid any inconvenience to enter the security code,and then later enable the security mode.

Moreover, since the mobile device is accessed only with the securitycode set in the security mode, no one is allowed to access the mobiledevice without the set security code. That is, a person having a highpriority or authorization to access the mobile device cannot access themobile device of a person having a lower priority or authorization.

SUMMARY OF THE INVENTIVE CONCEPT

The present inventive concept provides an electronic apparatus toselectively apply a security mode in a mobile device.

The present inventive concept provides a method of selectively applyinga security mode in a mobile device.

The present inventive concept provides a computer readable medium tocontain computer readable codes as a program to execute a method ofselectively applying a security mode in a mobile device.

Additional features and utilities of the present inventive concept willbe set forth in part in the description, which follows and, in part,will be obvious from the description, or may be learned by practice ofthe present inventive concept.

The foregoing and/or other features and utilities of the presentinventive concept may be achieved by providing a mobile device includinga user interface including a display panel to display a menu image and atouch panel to receive a user command, a network interface tocommunicate with an external network, a memory to store a password andan authorized user, a functional unit to sense a user and a motion ofthe mobile device during a power saving mode, and a control unit tocontrol operations of the mobile device and to perform an unlockingoperation during the power saving mode to unlock the mobile device. Theunlocking operation includes a motion detection process of sensing themotion of the mobile device, a user identification process of sensingthe user of the mobile device and determining that the sensed userrepresents the authorized user, in response to the sensed motion of themotion detection process, an unlocking process of unlocking the mobiledevice according to the determination of the user identification processand according to the password when the sensed user does not representthe authorized user in the user identification process.

The user identification process may include photographing the user togenerate a photographed user image, and determining that thephotographed user image as the sensed user represents the authorizeduser.

The user identification process may include sensing a signal from theuser to generate a sensed signal, and determining that the sensed signaluser as the sensed user represents the authorized user.

The user identification process may include photographing the user anddetermining that the photographed user represents the authorized user,and sensing a signal from the user and determining that the sensedsignal as the sensed user represents the authorized user when thephotographed user does not represent the authorized user.

The authorized user may be an authorized user image.

The authorized user may be an authorized user signal.

The sensed user may be an image of the user.

The sensed user may be a signal from a user device.

The sensed user may be a signal received from a user watch.

The sensed user may be a signal received from the external network.

The control unit may include a computer-readable medium to store aprogram to control the user interface, the network interface, thememory, and the functional unit, and to store data to perform operationsof the mobile device including the unlocking operation.

The control unit may include a computer-readable medium to store aprogram to control the user interface, the network interface, thememory, and the functional unit, and to transmit data to performoperations of the mobile device including the unlocking operation.

The control unit may include a computer-readable medium to store aprogram to transmit data through an internet to perform operations ofthe mobile device including the unlocking operation.

The control unit may perform receiving the password to set theauthorized user.

The control unit may perform receiving the password to change a settingof the authorized user.

The control unit may perform receiving the password to set a menu of themobile device.

The control unit may perform receiving the password to perform anoperation of the mobile device.

The functional unit may include a first sensor to sense the motion ofthe mobile device during the power saving mode, and a second sensor tosense the user during the power saving mode.

Information on the user identification process may be displayed as asymbol on the display panel of the user interface.

Information on the unlocking process may be displayed as a symbol on thedisplay panel of the user interface.

The sensing the user may include sensing a location area of the mobiledevice as an area condition and a wireless communication with theexternal network as a wireless communication condition, and thedetermining that the sensed user represents the authorized user mayinclude determining that the area condition and the wireless conditionas the sensed user represents the authorized user.

BRIEF DESCRIPTION OF THE DRAWINGS

These and/or other features and utilities of the present generalinventive concept will become apparent and more readily appreciated fromthe following description of the exemplary embodiments, taken inconjunction with the accompanying drawings of which:

FIG. 1 is a block diagram illustrating an electronic terminal tocommunicate with external devices according to an embodiment of thepresent inventive concept;

FIG. 2 is a diagram illustrating an electronic terminal according to anembodiment of the present inventive concept;

FIGS. 3A-3D are views illustrating an electronic terminal with a displayunit and a user interface unit according to an embodiment of the presentinventive concept;

FIG. 4 is a flowchart illustrating a method of selectively applying asecurity process in a mobile device according to an embodiment of thepresent inventive concept;

FIG. 5 is a flowchart illustrating a method of selectively applying asecurity process in a mobile device according to an embodiment of thepresent inventive concept;

FIG. 6A is a flowchart illustrating a method of setting a condition fora safe zone in a password setting mode of a mobile device according toan embodiment of the present inventive concept;

FIG. 6B is a flowchart illustrating a method of setting a condition fora non-safe zone in a non-password mode of a mobile device according toan embodiment of the present inventive concept;

FIGS. 7A through 7I are views illustrating screens of a mobile device toset a condition in a mobile device according to an embodiment of thepresent inventive concept;

FIGS. 8A through 8F are views illustrating screens of a mobile device toperform operations in a safe zone and in a non-safe zone according to anembodiment of the present inventive concept;

FIG. 9 is a view illustrating a mobile device to display a user inputmenu within a user finger-reaching area according to an embodiment ofthe present inventive concept;

FIGS. 10A, 10B, 10C, and 10D are graphs each schematically illustratingmovement patterns of a mobile device according to an embodiment of thepresent inventive concept;

FIG. 11 is a flowchart illustrating a method of selectively applying asecurity check process in a mobile device according to an embodiment ofthe present inventive concept; and

FIG. 12 is a flowchart illustrating a method of selectively applying asecurity check process in a mobile device according to an embodiment ofthe present inventive concept.

DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

Reference will now be made in detail to exemplary embodiments of thepresent general inventive concept, examples of which are illustrated inthe accompanying drawings, wherein like reference numerals refer to thelike elements throughout. The exemplary embodiments are described belowin order to explain the present general inventive concept whilereferring to the figures.

FIG. 1 illustrates an electronic terminal apparatus 110 to communicatewith one or more external apparatuses according to an embodiment of thepresent inventive concept. The electronic terminal apparatus 110 may bea computer apparatus, a portable personal computer, a mobile electronicdevice, a mobile phone, a mobile tablet apparatus, a mobile tabletcomputing apparatus, an audio or video recording and/or reproducingapparatus, a photographing apparatus, a communication device, etc.

The external apparatus may be an access point (AP) 120 such as awireless access point device to connect to a wired network using WiFi,WiFi direct, or related standards, a device 130 such as a Bluetoothdevice or radio frequency identification (RFID) device, etc, and astation 140 for wireless communication such as a carrier service stationfor 4G, LTE, etc. However, the present general inventive concept is notlimited thereto. It is possible that the external apparatus may beanother electronic apparatus. It is also possible that the externalapparatus may be an apparatus to communicate with the terminal 110 totransmit and receive data therebetween, and such an apparatus may be ahome appliance, such as a refrigerator or air conditioner.

The terminal 110 may be disposed within an area defined by a line 120Adistanced from the AP 120 or an area defined by a line 130A distancedfrom the device 130. The terminal 110 may communicate with the AP 120using the AP-related technology when being disposed within the areadefined by the line 120 a, and may also communicate with the device 130using the device-related technology when being disposed within the areadefined by the line 130A.

The terminal 110 may have menus and/or functions to correspond to data(signal) of the AP 120, the device 130, and the station 140. Theterminal 110 may have menus and functions to correspond to data (signal)stored in a storage unit of the terminal 110.

FIG. 2 illustrates a block diagram of an electronic terminal accordingto an embodiment of the present inventive concept. The terminal mayinclude a control unit 210, a network interface 220, a user interface230, a display unit 240, an audio unit 250, one or more functional unit260, a power supply unit 270 including a battery and a battery chargingunit. The above components may be disposed in or on a housing of theterminal.

The control unit 210 may control operations of the terminal and mayinclude a data storage unit, for example, a semiconductor memory unit.The control unit 210 may be connected to an external data storage unitdisposed in the housing. The housing of the terminal may include a portsuch that another external data storage can be detachably attached tothe port of the housing, and the port may be connected to the controlunit 110 to transmit and receive data.

The network interface unit 220 may communicate with an external networkapparatus, for example, the AP 120, the device 130, and the station 140which are illustrated in FIG. 1 .

The user interface unit 230 may receive a user input to controloperations of the terminal. The user interface unit 230 may include aphysical button or key board such as QWERTY keyboard. The user interfaceunit 230 may have a sensor to detect a user gesture as a user input. Theuser interface unit 230 may include a microphone to detect a user voiceas a user input. The user interface unit 230 may be a sensor to detectan image as a user input. The display unit 240 may include a screen todisplay an image corresponding to operations of the terminal. Thedisplay unit 240 may include a panel or a touch screen to perform afunction to display an image and also a function to receive a userinput. The user interface unit 230 and the display unit 240 may beformed as a single integrated body. The audio unit 250 may be a speakerand/or a microphone.

The functional unit 260 may be a photographing unit to photograph anobject and to generate a signal corresponding to the photographingobject. The signal may be processed in the control unit 210, displayedin the display unit 240, and/or transmitted to the external apparatusthrough the network interface unit 220.

The power supply unit 270 may be connectable to an external power sourceusing a wired and/or wireless method.

The control unit 210 is configured to selectively perform a securitymode according to a condition set by a user when the terminal receives auser input corresponding to a power-on, an activation mode in responseto a deactivation mode, a wake-up mode in response to a sleep mode,and/or a normal mode in response to a power-saving mode. The activation,wake-up, and normal mode may be usable as a common function of theterminal or may be usable differently, according to a design or userpreference. The condition may be a safe zone condition in a securitymode or may be a non-safe zone in a non-security mode, for example.After the condition is set in a normal mode of the terminal, theterminal is changed to the deactivation mode (the sleep mode or thepower-saving mode) a predetermined time after the normal mode or apredetermined time after no user input. And then the terminal provides aprocess for the security mode or does not provide the process for thesecurity mode according to the condition when being changed to theactivation mode (wake-up mode or the normal mode) according to the userinput.

FIGS. 3A-3D illustrating an electronic terminal 300 formed with adisplay unit and a user interface unit to display screens 300A-300Dcorresponding to operations of the electronic terminal 300 according toan embodiment of the present inventive concept.

As illustrated in FIG. 3A, the screen 300A of the terminal 300 A doesnot show an image according to a deactivation mode, a sleep mode, or apower saving mode. The terminal 300 may have a power switch 311 and aswitch 312 as a user input. The power switch 311 may be usable to turnon and off the terminal, and the switch 312 may be usable to change amode of the terminal 300, that is, to change from the deactivation mode,the sleep mode, or the power saving mode to an activation mode, awake-up mode, or a normal mode. The switch 312 may be a sensor to detecta motion of the terminal 300 or to detect a motion (image) of a user asa user input.

When the switch 312 of FIG. 3A is selected, the screen 300B of FIG. 3Bmay be displayed on a display unit to unlock or select a securityprocess to access the terminal 300 in a security mode. The screen 300 bmay include a state section 321 and a menu section 322. The statesection 321 may include a communication state with the AP 120, thedevice 130, and/or the station 321 of FIG. 1 , and may also includeother states corresponding to operations or functions set in theterminal 300 or environment around the terminal 300. The other statesmay include a time display or a battery state display, a temperaturestate display, a weather state display, etc. When the terminal 300 is ina power-on state, the terminal monitors, detects, determines, and/orperforms communications with external devices to correspond to theabove-described states of the state section 321.

When a menu 322A to unlock the terminal 300 is selected from the screen300 b, the screen 300C is displayed to show a security check process,for example, a password input process, as illustrated in FIG. 3C. Thescreen 300C may include a state section 331 and a menu section 332having a password indication section 332A and a password input section332B. When a password input by the user through the password inputsection 332B is identical to a password previously stored therein, theterminal 300 displays the screen 300D to show a state section 341 and amenu section 342 with menus (or icons) 342A.

When a first predetermined condition is set in the terminal 300 as asafe zone in a security mode (password setting mode), the screen 300A ischanged to the screen 300D without displaying the screens 300B and 300Cwhen the first predetermined condition is met. When the firstpredetermined condition is not met, the terminal displays the screens300B and 300C to require a security process to enter a password. When asecond predetermined condition is set in the terminal 300 as a non-safezone in a non-security mode (no password setting), the terminal displaysthe screens 300A, 300B, 300C, and 300D to normally access the terminalwhen the second predetermined condition is met. When the secondpredetermined condition is not met, the terminal 300 may not display thescreens 300B and 300C.

The state section 341 of the screen 300D may include an imagecorresponding to the safe zone and/or the non-safe zone according to thesecurity mode and/or non-security mode, respectively. The state section341 may not be selectable by a user as a user input. The menu section342 of the screen 300D may include one or more menus 342A selectable bya user as a user input to perform a function or operation of theterminal 300. The menu section 342 of the screen 300D may include asettings menu (icon) to set the security mode, the non-security mode,the safe zone, and/or the non-safe zone, etc.

FIG. 4 illustrates a method of selectively applying a security mode in amobile device according to an embodiment of the present inventiveconcept.

A power-on or activation switch is on in operation 410, a control unitof the mobile device determines whether a predetermined condition is metin operation 420. When the predetermined condition is met, that is, themobile device is in a safe zone, the mobile device operates a normalmode in operation 430 such that a user can access the mobile device.When the predetermined condition is not met in operation 420, that is,the mobile device is not in the safe zone, the mobile device requires auser to enter a password in operation 440 to authorize the user toaccess of the mobile device.

FIG. 5 illustrates a method of selectively applying a security mode in amobile device according to an embodiment of the present inventiveconcept

A predetermined condition is set in the mobile device in operation 510.When an activation switch is selected in operations 520A or 520B, asecurity mode is not performed to enter a normal mode in operation 530or the security mode is performed in operation 540 when thepredetermined condition is not met in operation 510. That is, the mobiledevice selectively performs the security mode according to selection ofan activation switch as a user input. The mobile device selectivelyrequires a user to perform the security mode. For example, when themobile device is in a safe zone according to the predeterminedcondition, the user is not required to process the security mode toenter a password. However, the mobile device is not in the safe zoneaccording to the predetermined condition, the user is still required toprocess the security mode to enter a password. Here, the password may bea character, number, motion, audio, and/or image.

FIG. 6A illustrates a method of setting a condition for a safe zone in apassword setting mode of a mobile device according to an embodiment ofthe present inventive concept

A user selects a settings menu in operation 610, and then selects apassword setting menu in operation 620 to set the mobile device as asecurity (password setting) mode or a non-security (no-password setting)mode.

A predetermined condition for a safe zone is selected in operation 630,and then is set in operation 640.

FIG. 6B illustrates a method of setting a condition for a non-safe zonein a non-password mode of a mobile device according to an embodiment ofthe present inventive concept.

When a user selects a non-security (no-password setting) mode or doesnot set a security mode in the settings menu in operation 650, thesettings menu may further include a menu to select a non-safe zone (orpassword-required zone) in operation 660. The predetermined conditioncan be set in operation 670 such that the mobile device monitors acurrent condition thereof to determine whether the current conditionmeets the predetermined condition. When the predetermined condition ismet, the mobile device requires the user to enter a password to accessthe mobile device in the non-security mode of the mobile device. Whenthe predetermined condition is not met, the mobile device does notrequire the user to enter the password in a similar manner to thenon-security mode.

FIGS. 7A through 7I illustrate screens 700A through 700I of a mobiledevice to set a condition for a safe zone of a security mode or anon-safe zone of a non-security mode according to an embodiment of thepresent inventive concept.

When a settings menu (button or icon) 710 is selected in the screen 700Aof the mobile device as a user input in FIG. 7A, the screen 700B of FIG.7B is displayed on a display unit and/or user input unit of the mobiledevice to show a selection of “security setting” 721 to set a security(password) as a security mode, a selection of “all” 722 to apply thesecurity mode to all functions or operations of the mobile device, and aselection of a “safe zone” 723 to prevent the security mode in apredetermined condition. It is possible that the selection of “all” 722and selection of “safe zone” 723 may be displayed in a separate screenfrom a screen of the security setting 721, that is, the selection of“all” 722 and selection of “safe zone” 723 may be displayed, performed,or selected independently after the security setting 721 is performed toset the security mode.

When a menu of the safe zone 723 is selected, the screen 700C isdisplayed to show an area menu 731 and/or a time menu 732 as thepredetermined condition. It is possible that both the area menu 731 andthe time menu 732 can be selected and set as the predeterminedcondition. It is also possible that only one of the area menu 731 andthe time menu 732 can be selected and set as the predeterminedcondition.

When the time menu 732 is selected, a specific time or a time period isset as the safe zone, using a new screen. Setting a specific time or atime period is well known, detail descriptions thereof will be omitted.When the time menu is performed to set the predetermined condition ofthe safe zone, the mobile device releases the security mode at thespecific time or during the time period such that the user can accessthe mobile device without the security process according to the set timemenu.

When the area menu 731 is selected, one or more area settings aredisplayed on the screen 700D of FIG. 7D. The one or more area settingsmay include a WiFi selection menu 741, a Bluetooth selection menu 742,and a communication method selection menu 743.

When the WiFi menu 741 is selected, at least one WiFi network 751 can beinput, detected and then displayed, or selected as a safe zone in thescreen 700E of FIG. 7E. When a user with a mobile device stays in ahouse of the user, for example, and an AP is located as a home useinside the house of the user, the AP as a home use may be reliablenetwork and environment to the user and thus the home AP can be set as asafe zone. In this case, the user does not have to enter a passwordevery time to activate or access the mobile device within an accessiblearea of the AP and/or inside the house. However, when a user with amobile device stays away from the AP, the mobile device requires theuser to enter the password since the predetermined condition is not metor the mobile device cannot communicate with the AP or lost a signalfrom the AP.

When the Bluetooth (device) is selected, at least one device 761 can beinput, detected and then displayed, or selected as a safe zone in thescreen 700 f of FIG. 7F. When a user with a mobile device is in avehicle owned by the user, for example, the Bluetooth and/or the vehiclemay be reliable network and environment to the user and thus the devicecan be set as a safe zone. In this case, the user does not have to entera password every time to activate or access the mobile device within anaccess area of the device, that is, within an inside of the vehicle.

It is possible that when a user vehicle is set as the device or the APfor the safe zone and when a signal indicating an emergence, forexample, traffic collision or accident to the vehicle, is generated fromthe vehicle and then transmitted to the mobile device through theBluetooth or WiFi, the mobile device can recognize the received signalas a predetermined condition of a safe zone so that the user can accessand/or use the mobile device without entering a password in the securitymode of the mobile device. Here, the vehicle and the mobile device areconfigured to recognize the signal as a portion of the predeterminedcondition of a safe zone. In this case, a combination of the selecteddevice and a specific or predetermined signal from the selected devicecan be set as the safe zone of the mobile device, and when the mobiledevice receives the signal from the device, so that the user can accessor use the mobile device without performing a security check process ina security mode of the mobile device.

It is also possible that when a user medical device is set as the deviceor the AP for the safe zone and when a signal indicating an emergencefor example, a life threatening situation or accident to the user, isgenerated from the medical device and then transmitted to the mobiledevice through the Bluetooth or WIFi, the mobile device can recognizethe received signal as a predetermined condition of a safe zone so thatthe user can access and/or use the mobile device without entering apassword in the security mode of the mobile device. Here, the medicaldevice and the mobile device are configured to recognize the signal as aportion of the predetermined condition of safe zone. In this case, acombination of the selected device and a specific or predeterminedsignal from the selected device can be set as a predetermined conditionof the safe zone of the mobile device, and when the mobile devicereceives the signal from the device, so that the user can access or usethe mobile device without performing a security check process in asecurity mode of the mobile device.

When the communication method 743 is selected, one or more communicationmethods (CMs) 771 and 772 can be selected and set as a safe zone on thescreen 700 g of FIG. 7G. In this case, a carrier name 771 and/ortelephone number 772 can be reliable to the user. That is, when the usercommunicates with the person of the telephone number 772 and the carriername 771, the user does not have to enter a password to use the mobiledevice.

In the screen 700H of FIG. 7H, at least one or a combination of theWifi, Bluetooth, and communication method can be selected and/or set ina menu 781 as safe zone.

When the security mode is not selected or set in the settings menu 710of the screen 700 a, a menu 791 of non-safe zone can be selected and setsuch that the mobile device is set to perform a security mode in anon-security mode of the mobile device. For example, an AP, a device, ora communication method is set as the non-safe zone using one or morenon-safe zone selection processes similar to the safe zone selectionprocesses of FIGS. 7D through 7H.

FIGS. 8A through 8F illustrate screens 800 a through 800 f of a mobiledevice to perform operations in a safe zone and in a non-safe zoneaccording to an embodiment of the present inventive concept

FIG. 8A illustrates the screen 800A, a power on/off switch 811, and anactivation switch 812. FIG. 8B illustrates the screen 800B including astate section 821 and a menu section 822. The state section 821 may besimilar to the state section 321, 331, and 341 of FIGS. 3B, 3C and 3D.The state section 821 may include a state indicator 821A to indicate apredetermined state and/or a safe zone in a security mode. The statesdisplayed on the state section 821 may not be selectable by a user as auser input. The menu section 822 may include one or more menus 822A and822B which are displayable on a display unit and/or selectable by a useras a user input.

When a current condition matches the predetermined condition as the safezone, the mobile device displays the screen 800B by skipping a securitymode process. It is possible that the mobile device can display on thescreen 800C with a state section 831 and a menu section 832 including atext message 832A and selection menus 832B relating to the displayedtext 832A when the mobile device receives the test message 832A. It isalso possible that the mobile device can display on the screen 800D witha state section 841 and a menu section 842 including a telephone callmessage 842A including selection menus relating to the telephone callmessage 842A when the mobile device receives the telephone call suchthat the user can access and use the mobile device.

The screen 800E of FIG. 8E illustrates a state section 851 and a menusection 852 including at least one menu 853. The screen 800E may bedisplayed when a password is entered in a security (password-setting)mode, when a predetermined condition of a safe zone is met in thesecurity mode, or when a password is entered in a non-security mode andin a non-safe zone. The menu 853 may be a settings menu to select,change, or modify settings of the mobile device. In this case, it ispossible that the mobile device may require the user to enter a passwordto select, change, or modify settings when the screen 800E is displayedwhen a predetermined condition of a safe zone is met in the securitymode and accordingly a security mode is not preformed.

FIG. 9 illustrates a mobile device 900 to display a state section 911and a user menu section 912 according to an embodiment of the presentgeneral inventive concept. A user U holds the mobile device 900 usingone hand. At least one of user fingers UF of the user one hand can beusable to select a menu to input a user input. The user menu section 912may include a user menu area 912B and a non-user menu area 912C whichare defined by a line 912A to be a user-finger reachable area and auser-finger unreachable area, respectively. One or more menus or imagesdisplayed within the user menu area can be selectable by a user using afinger without assistance of the other hand finger, and one or moremenus or images displayed within the non-user menu area 912C may not bereachable selectable by the user using the same finger. It is possiblethat the non-user menu area 912C may not include a menu to be selectableby a user as a user input. Accordingly, a user can control the mobiledevice with one hand.

FIGS. 10A, 10B, 10 c, and 10D are graphs schematically illustrating amotion of a mobile device according to an embodiment of the presentinventive concept. The graph of FIG. 10A illustrates the motion of themobile device. The motion of the mobile device may be represented by apattern (or movement pattern) P1 with amplitudes with respect to amovement axis. The amplitudes may be represented with respect to a timeaxis. The mobile device may be movable and/or rotatable in up and downdirections, back and forth directions, side directions, differentdirections, etc. The amplitudes may be exaggerated by eliminatingcrossing portions in which the mobile device changes the directionsthereof and/or by eliminating relatively small portions of theamplitudes before or after the direction changes. Values of theamplitudes may be an absolute value.

The mobile device may be same as the mobile device illustrated in FIG. 2. The functional unit 260 of the mobile device may include aphotographing unit to photograph an object, and a sensing unit to sensethe mobile device and/or a user of the mobile device. The functionalunit 260 may be a unit to perform a process including a motion detectionprocess and a user identification process, which are described above andalso will be described later. The sensing unit may include a firstsensor unit to sense a motion state of the mobile device, a secondsensor unit to sense an environmental state, for example,brightness/darkness, of the mobile device, and a third sensor unit tosense a state of the user of the mobile device. However, the mobiledevice is not limited thereto. The functional unit 260 may furtherinclude a medical detector to detect a medical state of the user of themobile device.

The first sensor unit of the functional unit 260 may include sensorsincluding, for example, gyro sensors, to detect a motion state of themobile device. The first sensor unit may sense a movement, that is, themotion state, of the mobile device when the user of the mobile devicemoves, walks, or runs, or when the mobile device moves or rotatesaccording to a movement of an apparatus in which the user and the mobiledevice may be disposed. The control unit 210 of the mobile devicereceives signals output from the functional unit 250 of the mobiledevice. An output of the first sensor unit of the function unit 260 maybe represented by the pattern P1 of FIG. 10A.

When the mobile device is in a non-operational mode, such as adeactivation mode, a sleep mode, a power saving mode, and a turn-offmode, the mobile device may be partially activated, that is, thefunctional unit 260 and the control unit 210, for example, of the mobiledevice may operate to monitor (or detect) the motion state of the mobiledevice during the non-operational mode. When the user wants to changethe non-operational mode to an operational mode, such as a normal mode,a user hand may hold the mobile device and then may place the mobiledevice in front of a user face within a length of a user arm from theuser face when the user is in a stationary state or in a movable state,or the user or the user hand may touch the mobile device within thelength of the user arm when the mobile device is in the stationary stateand is disposed on a table, for example, which is not in the movablestate. The mobile device may recognize a moment in which the mobiledevice is about to be changed from the non-operational mode to theoperational mode according to a movement pattern, that is, the motionstate of the mobile device.

Here, the operational mode may include a partial operational mode and afull operational mode. In the partial operational mode, the user may beallowed to access one of full functions of the normal mode of the mobiledevice without the security check process requiring the password. In thepartial operational mode, the one of the full functions of the normalmode may be a photographing function to photograph an object and displaythe photographed object on a screen of the display unit 240 of FIG. 2 .In the full operational mode including the normal mode, the user may beallowed to access all the functions of the mobile device by performingthe security check process when a condition is not met or withoutperforming the security process when the condition is met, as describedabove.

The mobile device may periodically monitor (or detect) the state of themobile device. For example, the mobile device may repeatedly monitor thestate of the mobile device during the non-operational mode and/or duringthe operational mode according to a user or design preference. When themobile device monitors the state of the mobile device during theoperational mode, the control unit 210 may extern a time period afterwhich a mode of the mobile device is changed from the operational modeto the non-operational mode, for example, the power saving mode,according to the motion state of the mobile device and a photographedimage of the functional unit 260, which will be described later.Therefore, if the mobile device is set to change the operational mode tothe non-operational mode five minutes after no input from the user tothe mobile device, the five minutes may be changed to seven minutes, forexample, by extending two more minutes, according to a determination ofthe control unit 210 by using sensed data including the motion state ofthe mobile device and/or the photographed image of the functional unit260, for example.

Although FIGS. 10A through 10D illustrates the motion state of themobile device when the mobile device is changed from the operationalmode to the non-operational mode, the present disclosure is not limitedthereto. The motion state of the mobile device may be detected duringthe operational mode periodically, for example, every a tenth secondperiod. The motion state of the mobile device may be detected during thenon-operational mode periodically, for example, every a half secondperiod. However, the above-described a tenth second period and a halfsecond period are examples, and thus the periods may vary according to auser or design preference or according to a user habit, for example, amovement pattern, with the mobile device.

Referring back to FIG. 10A, the sensing unit senses the motion state ofthe mobile device and outputs signals to the control unit 210. Thesignals correspond to the pattern P1. When the pattern P1 is changedfrom a first certain amplitude to a second certain amplitude, forexample, a zero level, at a time T1, the control unit 260 may determinethat the user is about to access the mobile device at a moment S1.According to experiments, the user holds the mobile device at least in arelatively stationary state or a relatively stable state at least at thetime T1, to use the mobile device at the moment S1, and the holdingstate of the mobile device by the user is represented by the change inthe amplitude of the pattern P1.

At the moment S1, the control unit 210 determines that the mobile deviceis disposed in front of the user face within the length of the user arm,and then activates the functional unit 260 to photograph an object whichis a person disposed in front of the mobile device. The control unit 210may analyze the photographed person according to a comparison method ofcomparing a photographed object with an image of an authorized user,which may be stored in a memory of the mobile device, and then determinewhether the person, that is, the photographed object, is the authorizeduser. The comparison method may be a facial recognition method. If thecontrol unit 210 recognizes the person as the authorized user, thecontrol unit 210 controls the mobile device to operate the normal modewithout performing the security checking process. If the control unit210 does not recognize the person as the authorized user, the controlunit 2310 performs the security checking process requiring the person orthe user to enter the password to access the normal mode of the mobiledevice.

If the image of the authorized image is stored in a memory of anexternal device, the control unit activates the network interface 220 tocommunicate with the external device and to send the photographed imageto the external device. When the external device determines whether thereceived image is identical to the stored image of the authorized user,the external device outputs the determination to the network interface220 of the mobile device. According to the received determination fromthe external device, the control units determines whether to perform thesecurity checking process before allowing the person or user to accessthe normal mode of the mobile device.

The time T1 may be same as the moment S1. However, there may be a timelag between the moment S1 and the time T1. The time lag may be a certainshort period of time, for example, a quarter second. The control unit210 analyzes the pattern P1 to see a first pattern before the time T1and a second pattern at the time T1. The control unit 210 may recognizea significant amplitude change or a different pattern change in thepattern S1, and then may determine that the user is in a state to changethe non-operational mode to the operational mode or that the mobiledevice is touched by the user to operate the normal mode.

At the moment S1, the user may select an icon corresponding to thepartial operational mode, for example, a camera icon to photograph anobject, which may not require the security check process when the mobiledevice is changed from the non-operational mode to the operational mode.In this case, the control unit 210 may operate the partial operationalmode. However, the control unit 210 may extract an image from thephotographed object and may compare the extracted image with the imageof the authorized user. If the control unit 210 recognizes the extractedimage to correspond to the image of the authorized user, the controlunit 210 may allow the user to access the normal mode of the mobiledevice without the security check process. The photographing unit mayinclude a first photographing unit to photograph the object during thepartial operational mode and a second photographing unit to photograph aperson in front of the mobile device to determine whether the person isthe authorized user. The control unit 210 may control the firstphotographing unit and the second photographing unit to perform theabove-described operations. The photographed image of the firstphotographing unit may be displayed on the display unit 240. However,the photographed image of the second photographing unit may not bedisplayed on the display unit 240. However, the present disclosure isnot limited thereto. The photographed image of the second photographingunit may be displayed on the display unit 240, or a symbol representingthe photographed image of the second photographing unit may be displayedon the display unit.

FIG. 10B illustrates a pattern P2 of the mobile device. The mobiledevice is in a stationary state, that is, a not-moving state, until atime T2A, is changed from the stationary state to a moving state betweenthe time T2A and a time T2B, and then is changed to a stop state at thetime T2B. The control unit 210 determines that the user touches (orpicks up) the mobile device and/or is about to use the mobile device.Accordingly, the control unit 210 may allow the user to use the normalmode of the mobile device according to a detection of a movement patternof the mobile device and a user identification process. According toexperiments, the user touches the mobile device, which is in astationary state or a stable state, at least between the time T2A andthe time T2B, to use the mobile device at the moment S2, and thetouching (or holding) state of the mobile device by the user isrepresented by the change in the amplitudes of the pattern P2.

FIG. 10C illustrates a pattern P3 of the mobile device. The mobiledevice may move and/or rotate in different directions. Here, differentlyfrom FIG. 10A ignoring the crossing portions of the amplitudes withrespect to the time axis, FIG. 10C illustrates a crossing portion of theamplitudes with respect to the time axis. A portion of the pattern P3just before a time T3A and/or a portion of the movement pattern P3 justafter the time T3A may be different from a portion of the movementpattern P3 at a time T3B. The control unit 210 analyzes the portions ofthe pattern P3 and determines that the mobile device is in front of theuser face at the time T3B according to the detected pattern P3 of themobile device. And thus, the control unit 210 may perform the useridentification process by activating the photographing unit tophotograph a person, and may determine whether the person is theauthorized user. The control unit 210 may extract a portion of thephotographed image, and then may compare the extracted portion to theimage of the authorized user. According to experiments, the user holdsthe mobile device at least in a relatively stationary state or arelatively stable state at least at the time T3B, to use the mobiledevice at the moment S3, and the holding state of the mobile device bythe user is represented by the change in the amplitudes of the patternP3

FIG. 10D illustrates a pattern P4 of the mobile device. The mobiledevice may repeatedly move and/or rotate in different directions. Here,differently from FIG. 10A ignoring the crossing portions of theamplitudes with respect to the time axis, FIG. 10D illustrates a numberof crossing portions of the amplitudes with respect to the time axis inthe movement pattern P4. A number of the crossing portions of themovement pattern P4 before a time T4A may be different from a portion ofthe pattern P4 at a time T4B. Amplitudes of the pattern P4 may bedifferent from the amplitudes of the patterns P1, P2, and P3. The userand the mobile device may be disposed inside a moving apparatus, forexample, a vehicle or a train. The user holding the mobile device mayride a bicycle. However, the present disclosure is not limited thereto.The user having the mobile phone may jog along a road. According toexperiments, the user holds or touches the mobile device at least in arelatively stationary state or a relatively stable state at least at thetime T4, to use the mobile device at the moment S4, and the holding ortouching state of the mobile device by the user is represented by thechange in the amplitudes of the pattern P4.

The control unit 210 analyzes the pattern P4 and determines that themobile device is disposed in front of the user face at the time T4Baccording to the detected pattern P4 of the mobile device. And thus, thecontrol unit 210 may perform the user identification process byactivating the photographing unit to photograph a person in front of themobile device, and may determine whether the person is the authorizeduser. The control unit 210 may extract a portion of the photographedimage, and then may compare the extracted portion to the image of theauthorized user.

When the user having the mobile device moves, the mobile device mayreceive a phone call. The user may stop to enter the password to themobile device to answer the phone call. However, the mobile device maydetect the motion of the mobile device, detect the pattern of the mobiledevice, detect a characteristic of the pattern, and then determine thatthe user is to use the mobile phone, is disposed in front of the displayunit 240 of the mobile device, and/or is about to answer the phone call.Since the mobile device recognizes a person holding or touching themobile phone as the authorized user of the mobile device, the authorizeduser may easily answer the phone call without the security check processof entering the password which is set in the mobile device to access thenormal mode of the mobile device.

Although FIGS. 10A through 10D respectively illustrate the patterns P1through P4, the present disclosure is not limited thereto. Anothermovement pattern of the mobile device may be used to perform a movementpattern detection process and a user identification process as describedabove, as long as the another pattern of the mobile device correspondsto a case in which a person holds or touches the mobile device and/or isdisposed in front of the mobile device to use the mobile device or touse the normal mode of the mobile device.

According to an embodiment, the control unit 210 of the mobile devicemay not activate the photographing unit until the detected movementpattern matches at least one of reference patterns which represent thatthe user is to use the mobile device, or until the portion of thedetected movement pattern approaches to a certain level representing asituation in which the user is to use the mobile device. That is, thecontrol unit 210 of the mobile device may activate the photographingunit when a predetermined pattern is detected or when a predeterminedportion of a pattern is detected. However, when the user identificationfails, that is, when the person holding and touching the mobile deviceis not the authorized user, the control unit 210 of the mobile devicemay maintain the non-operational mode without performing the securitycheck process or the person has to select a key of the mobile device toenter the password in the security check process to use the normal modeof the mobile device.

The second sensing unit may detect brightness around the mobile device.If a brightness level is lower than a predetermined level, the controlunit 210 may not activate the photographing unit since the environmentstate of the mobile device is not sufficient to operate thephotographing unit to photograph the person or object. If the brightnesslevel is not lower than the predetermined level, the control unit 210may activate the photographing unit since the environment state of themobile device is sufficient to control the photographing unit tophotograph the person or object The detection of the brightness by thesecond sensing unit may prevent an unnecessary activation of thephotographing unit in the lower level of the brightness around themobile device. In this case, the control unit 210 may perform thesecurity check process or maintain the non-operational mode. When thenon-operational mode is maintained, the control unit 210 may perform thesecurity check process when a user selects a key to access the normalmode of the mobile device.

The third sensing unit may be usable to detect any signal from the userin the user identification process. Although the photographing unit isused for the user identification process by photographing the person infront of the mobile device, the third sensing unit may be used for theuser identification process instead of the photographing unit if theuser identification process uses the signal from the user rather thanusing the photographed image, if the environmental state of the mobiledevice is not sufficient to photograph an object, or if thephotographing unit is unusable or malfunctions. The signal from the usermay be a signal from a user's own additional device, such as a userwatch. The user's own additional device may send to the mobile devicethe signal representing that the user is the authorized user of themobile device. In this case, the mobile device is set to communicatewith the third sensing unit and to recognize the signal representing theauthorized user of the mobile device. The third sensing unit and thenetwork interface 220 may be a single unit.

According to an embodiment, the control unit 210 of the mobile devicemay selectively activate one or more units of the mobile deviceillustrated with reference to FIGS. 1 through 9 according to a timeperiod or according to the motion of the mobile device to perform aninternal process including a motion detection process and a useridentification process. And thus, the security checking process isselectively applied to allow the user to access the normal mode of themobile device.

FIG. 11 illustrates a method of selectively applying a security checkprocess in the mobile device of FIG. 2 according to an embodiment of thepresent inventive concept.

At operation 1110, the control unit 210 of the mobile device may detecta condition of the mobile device. The condition may include a connectioncondition in which the mobile device is connected to an external device,an area condition in which the mobile device and/or the external deviceare disposed in an area, a time condition in which the mobile device isto operate at a time, a signal condition in which the mobile devicereceives a predetermined signal from the external device, a movementpattern and user identification condition in which the mobile devicedetects a movement pattern and performs a user identification accordingto the movement pattern, and any combination thereof. Hereinafter, theabove-described conditions may be referred to as an internal processwhich is performed in the mobile device with or without informing theuser of the internal process. The internal process may be informed tothe user through the display unit 240 of the mobile device. Theinforming of the internal process to the user may include displaying animage or message on the display unit 240 and/or generating an audiosignal through the audio unit 250 of the mobile device.

At operation 1120, the control unit 210 of the mobile device maydetermine whether the condition is met. If the condition is met, themobile device does not require a security check process and allows theuser to access the normal mode of the mobile device at operation 1130.However, the condition is not met, the mobile device requires thesecurity check process at operation 1140 before allowing the user toaccess the normal of the mobile device at operation 1130.

FIG. 12 illustrates a method of selectively applying a security checkprocess in the mobile device of FIG. 2 according to an embodiment of thepresent inventive concept

Referring to FIGS. 10A through 12 , the motion of the mobile device isdetected, the movement pattern of the mobile device is detected, andthen the control unit 210 of the mobile device determines whether theuser holds (or picks up) or touches the mobile device and is to use themobile device according to the detected movement pattern. That is, atoperation 1210, the control unit 210 may determines whether one of thedetected movement patterns matches a predetermined reference patternand/or whether a portion of the detected movement patterns matches apredetermined portion of a predetermined reference pattern.

At operation 1220, when the control unit 210 may recognize that the userholds or touches the mobile device or is in front of the mobile device,to use the mobile device, by determining that one of the detectedmovement patterns matches at least one of reference pattern and/or bydetermining that a portion of the detected movement patterns matches atleast one of reference portions of the reference patterns, the controlunit 210 may perform the user sensing and/or identification process toidentify the person who holds or touches the mobile device or is infront of the mobile device, to use the mobile device. If the person isthe authorized user, the mobile device changes the mobile device fromthe non-operational mode to the operational mode and/or allows the userto access the normal mode of the mobile device. The mobile device mayfurther include a storage memory as the functional unit 260 to store thereference patterns and the reference portions of the reference patterns.

The control unit 210 may control the display unit 240 to display animage (or message) which corresponds to information on theabove-described process or the photographed image. However, the controlunit 210 may control the display unit 240 not to display any image ormessage which corresponds to the information on the above-describedprocess or the photographed image, so that a power consumption isreduced. In this case, a user may not recognize the above-describedprocess internally performed by the control unit 210 of the mobiledevice.

Therefore, the mobile device is able to recognize a user who wants touse the mobile device or wants to change the non-operational mode to theoperational mode, with or without informing the user of an internalprocess (that is, the above-described process) of the mobile device.Therefore, the user may conveniently use the mobile device withoutentering the password to the mobile device when the condition is met.

As described above, the mobile device may operate the normal mode of themobile device without performing the security check process, accordingto the motion detection and the photographed image.

As described above, the mobile device may operate the normal mode of themobile device according to the photographed object and the sensed motionof the functional unit, without a user input to the security checkprocess.

As described above, the mobile device may operate the normal mode of themobile device by internally performing the motion and image sensingprocess.

As described above, the mobile device may change a non-operational modeto an operation mode corresponding to the normal mode by performing aninternal process corresponding to the motion and image sensing processwithout informing the user of the internal process.

As described above, the mobile device may extend a time period of theoperational mode without a user input according to the operations of thefunctional unit of the mobile device.

As described above, the mobile device may change a non-operational modeto an operation mode corresponding to the normal mode without a userinput to the mobile device.

As described above, the user may use one hand to hold or touch themobile device and the user may not use the other hand to access thenormal mode of the mobile device since the mobile device internallyperform the motion and image sensing process. In this case, the mobiledevice does not require the other hand to select a key of the mobiledevice or to operate the security check process to enter the password tothe mobile device in the security mode of the mobile device. Even if theuser is a handicapped person, the user may access the normal mode of themobile device by touching the mobile device by using any portion of theuser body.

The present general inventive concept can also be embodied ascomputer-readable codes on a computer-readable medium. Thecomputer-readable medium can include a computer-readable recordingmedium and a computer-readable transmission medium. Thecomputer-readable recording medium is any data storage device that canstore data as a program which can be thereafter read by a computersystem. Examples of the computer-readable recording medium include aread-only memory (ROM), a random-access memory (RAM), a flash memory, asemiconductor chip package, CD-ROMs, magnetic tapes, floppy disks, andoptical data storage devices. The computer-readable recording medium canalso be distributed over network coupled computer systems so that thecomputer-readable code is stored and executed in a distributed fashion.The computer-readable transmission medium can transmit carrier waves orsignals (e.g., wired or wireless data transmission through theInternet). Also, functional programs, codes, and code segments toaccomplish the present general inventive concept can be easily construedby programmers skilled in the art to which the present general inventiveconcept pertains.

As illustrated above, a mobile device can be set in a security mode anda safe zone may be set in the security mode so that the mobile devicedoes not require a user to enter a password when a current conditionmatches a condition of the safe zone.

The conditional of the safe zone may include a connection condition inwhich an external device is connected to the mobile device according toa wireless or wired method, an area condition in which the mobile deviceand/or the external device are disposed in an area, a time condition inwhich the mobile device is to operate at a time, a signal condition inwhich the mobile device receives a certain signal from an externaldevice, and an internal process condition in which the mobile deviceinternally performs an internal process corresponding to the motiondetection and user identification process, without informing the user ofthe performance of the internal process.

Although a few exemplary embodiments of the present general inventiveconcept have been shown and described, it will be appreciated by thoseskilled in the art that changes may be made in these exemplaryembodiments without departing from the principles and spirit of thegeneral inventive concept, the scope of which is defined in the appendedclaims and their equivalents.

What is claimed is:
 1. A mobile device, comprising: a user interfaceincluding a display panel to display a menu image and a touch panel toreceive a user input; a network interface to communicate with anexternal network; a memory to store a password and an authorized user; afunctional unit to sense a motion of the mobile device and a user of themobile device; and a control unit to control the user interface, thenetwork interface, the memory, and the functional unit, and to performan unlocking operation during the power saving mode to unlock the mobiledevice to a normal mode, wherein the unlocking operation comprises: amotion detection process of sensing the motion of the mobile device; auser identification process of sensing the user of the mobile device anddetermining that the sensed user is the authorized user according to atime condition, in response to the sensed motion in the motion detectionprocess; and an unlocking process of unlocking the mobile deviceaccording to the determination that the sensed user is the authorizeduser in the user identification process.
 2. The mobile device of claim1, wherein the unlocking operation further comprises unlocking themobile device according to the password when the user identificationprocess fails the sensing the user or the determining that the senseduser is the authorized user.
 3. The mobile device of claim 1, whereinthe control unit unlocks the mobile device according to the unlockingprocess or according to the password during the power saving mode, andthe control unit performs a setting of the mobile device according tothe password during the normal mode.
 4. The mobile device of claim 1,wherein the control unit performs setting a menu of the mobile deviceaccording to the password during the normal mode.
 5. The mobile deviceof claim 1, wherein: the control unit performs a partial operation inresponse to the sensed motion of the motion detection process, duringthe power saving mode without unlocking the mobile device; and thepartial operation comprises a phone function or a photographingfunction.
 6. The mobile device of claim 1, wherein the control unitperforms one of a partial function and the user identification processin response to the sensed motion of the motion detection process, duringpower saving mode.
 7. The mobile device of claim 1, wherein” the controlunit performs a photographing function in response to the sensed motionduring the power saving mode before the mobile device is not unlocked;and the control unit performs the photographing function during thenormal mode after the mobile device is unlocked.
 8. The mobile device ofclaim 1, wherein the control unit performs a partial operation accordingto a selection of a camera icon, in response to the sensed motion duringthe power saving mode, without unlocking the mobile device.
 9. Themobile device of claim 1, wherein: the control unit activates the useridentification process in response to the sensed motion; and the controlunit receives a selection of a camera icon from the user to perform aphotographing function during the power saving mode, in response to thesensed motion.
 10. The mobile device of claim 1, wherein the controlunit performs a photographing function by receiving a selection of acamera icon from the user in response to the sensed motion.
 11. Themobile device of claim 1, wherein: the functional unit comprises a firstelement to photograph an object to generate the photographed object in apartial operation, and a second element to sense the user to generatethe sensed user in the unlocking operation; the first element and thesecond element are activated during the power saving mode in response tothe sensed motion; and the control unit performs the partial operationof photographing the object and displaying the photographed object whenthe partial operation is selected.
 12. The mobile device of claim 1,wherein: the functional unit comprises a sensor to sense a brightness;and the user identification process comprises detecting the brightnessin response to the sensed motion, photographing the user according tothe brightness, and determining that the photographed user as the senseduser is the authorized user.
 13. The mobile device of claim 1, whereinthe user identification process comprises detecting a level of abrightness to photograph the user in response to the sensed motion, andgenerating the photographed user as the sensed user.
 14. The mobiledevice of claim 1, wherein: the control unit detects a brightness byusing the functional unit, in response to the sensed motion; and thecontrol unit performs another unlocking process of unlocking the mobiledevice according to the password, without performing the useridentification process and the unlocking process, according to a levelof the brightness.
 15. The mobile device of claim 1, wherein: theunlocking operation further comprises detecting a brightness by usingthe functional unit, in response to the sensed motion; and the controlunit determines whether to activate the user identification process ofthe unlocking operation or another unlocking operation using thepassword, according to the brightness.
 16. The mobile device of claim 1,wherein: the unlocking operation further comprises detecting anenvironmental state by using a sensor of the functional unit, inresponse to the sensed motion; and the control unit performs anotheruser identification process of sensing a user device as the sensed userwhen the user identification process fails according to theenvironmental state.
 17. The mobile device of claim 1, wherein: theunlocking operation further comprises detecting an environmental stateof the mobile device by using a sensor of the functional unit, inresponse to the sensed motion; and the control unit determines whetherto activate the user identification process of the unlocking operationor another unlocking operation using the password, according to thedetected environment state.
 18. The mobile device of claim 1, wherein:the authorized user comprises an authorized user image; and the useridentification process comprises sensing a user image from the user asthe sensed user to determine whether the sensed user image is theauthorized user image.
 19. The mobile device of claim 1, wherein: theauthorized user comprises an authorized user signal; and the useridentification process comprises sensing a user signal from a userdevice as the sensed user to determine whether the sensed user signal isthe authorized user signal.
 20. The mobile device of claim 1, wherein:the authorized user comprises an authorized user image and an authorizeduser signal; and the sensed the user comprises sensing a user image fromthe user to correspond to the authorized user image and sensing a usersignal from a user device of the user to correspond to the authorizeduser signal.
 21. The mobile device of claim 1, wherein the useridentification process comprises photographing the user, extracting auser image from the photographed user, and determining that theextracted user image as the sensed user represents an image of theauthorized user.
 22. The mobile device of claim 1, wherein: the useridentification process further comprises a first process ofphotographing the user and determining that an extracted image of thephotographed user as the sensed user represents an image of theauthorized user, and a second process of sensing a signal from a userdevice of the user and determining that the sensed signal as the senseduser represents a signal of the authorized user; and the unlockingprocess comprises unlocking the mobile device according to thedetermination of the first process of the user identification process oraccording to the determination of the second process of the useridentification process.
 23. The mobile device of claim 1, wherein: theuser identification process further comprises a first process ofphotographing the user and determining whether an extracted image of thephotographed user as the sensed user represents an image of theauthorized user, and a second process of sensing a signal from a userwatch of the user and determining that the sensed signal as the senseduser represents a signal of the authorized user; and the unlockingprocess comprises unlocking the mobile device according to thedetermination of the first process without performing the secondprocess.
 24. The mobile device of claim 1, wherein: the useridentification process further comprises a first process ofphotographing the user and determining whether an extracted image of thephotographed user as the sensed user represents an image of theauthorized user, and a second process of sensing a signal from a userwatch of the user and determining that the sensed signal as the senseduser represents a signal of the authorized user; and the unlockingprocess comprises unlocking the mobile device according to thedetermination of the second process when the first process fails. 25.The mobile device of claim 1, wherein the time condition comprises atime period, and the user identification process is performed accordingto the time period.
 26. The mobile device of claim 1, wherein: a motionstate of the mobile device changes from a first period with a firstamplitude to a second period with a second amplitude; and the functionalunit comprises a sensor to sense the motion at a moment of the secondperiod in the motion detection process.
 27. The mobile device of claim1, wherein: a motion state of the mobile device changes between a firstperiod with a first amplitude and a second period with a secondamplitude, with respect to a time; and the functional unit comprises asensor to sense a time lag from the time to generate the sensed motionin the motion detection process.
 28. The mobile device of claim 1,wherein: the mobile device is in a stationary state in a first periodand a touching state in a second period; and the functional unit sensesthe motion at a moment of the touching state of the second period in themotion detection process.
 29. The mobile device of claim 1, wherein: themobile device is in a moving state of moving in a plurality ofdirections during a first period and is in a stationary state of beingin a predetermined position during a second period after the firstperiod; and the functional unit senses the stationary state at a time ofthe second period as the motion of the mobile device in the motiondetection process.
 30. The mobile device of claim 1, wherein: the mobiledevice moves in different directions along a time axis; and thefunctional unit senses a state of the mobile device at a predeterminedcrossing portion of the different directions as the sensed motion. 31.The mobile device of claim 1, wherein: the mobile device moves indifferent positions with a number of crossing portions along a timeaxis; and the functional unit senses a state of the mobile device at apredetermined one of the crossing portion of the crossing portions asthe sensed motion.
 32. The mobile device of claim 1, wherein: the mobiledevice is in a first stationary state, is in a moving state after thefirst stationary state, and is in a second stationary state of being apredetermined position after the moving state; and the functional unitsenses the second stationary state as the motion of the mobile device.33. The mobile device of claim 1, wherein: the mobile device is in astationary state of being on a reference, and moves from the stationarystate to a touching state of being in a predetermined position withrespect to the reference; and the functional unit senses the touchingstate as the motion of the mobile device.
 34. The mobile device of claim1, wherein: the mobile device is in a non-touching state of being on areference, and is in a touching state after the non-touching state; andthe functional unit senses the predetermined position of the touchingstate as the motion of the mobile device.
 35. The mobile device of claim1, wherein: the mobile device is in a non-moving state, a moving state,and a stop state sequentially; and the functional unit comprises asensor to sense a predetermined position of the stop state as the motionof the mobile device.
 36. The mobile device of claim 1, wherein: themobile device is in a moving state of moving at a speed in a directionwith a number of different positions including a predetermined positionand is in a stationary state of being the predetermined position afterthe moving state; and the functional unit comprises a sensor to sensethe predetermined position of the stationary state as the motion of themobile device.
 37. The mobile device of claim 1, wherein: the mobiledevice moves according to a plurality of patterns; and a predeterminedone of the patterns is sensed as the sensed motion of the mobile device.38. The mobile device of claim 1, wherein the control unit comprises acomputer-readable medium containing computer-readable codes as a programto execute the unlocking operation.
 39. The mobile device of claim 1,wherein the control unit comprises a computer-readable medium containingcomputer-readable codes as a program to execute transmission of datawith the external network through an internet to perform operations ofthe mobile device.
 40. The mobile device of claim 1, wherein the controlunit displays a symbol on the display panel as information on theunlocking process of the unlocking operation.
 41. The mobile device ofclaim 1, wherein: the control unit senses a location of the mobiledevice in the user identification process; and the control unitdetermines that the sensed location as the sensed user represents theauthorized user and unlocks the mobile device according to thedetermination.
 42. The mobile device of claim 1, wherein: the timecondition comprises a time period; the sensing the user comprisesphotographing the user during the time period; the determining comprisesdetermining that the photographed user is the authorized user during thetime period; and the unlocking process comprises unlocking the mobiledevice according to the determination that the photographed user is theauthorized user.
 43. The mobile device of claim 1, wherein: the timecondition comprises a time period; the user identification processcomprises receiving a password and determining that the password is theauthorized user when the mobile device is not in the time period; andthe unlocking process comprises unlocking the mobile device according tothe password.