Method for controlling security system and electronic device thereof

ABSTRACT

A first electronic device, a second electronic device and methods for operating the same are provided. The method of the first electronic device includes obtaining wearing status information of a second electronic device which is wearable, and determining a security environment of the first electronic device based on the wearing status information. The method of the second electronic device includes detecting a wearing status of the second electronic device, confirming at least once of a security level and a user profile corresponding to the wearing status, and sending information of the security level or the user profile to a first electronic device.

PRIORITY

The present application claims priority under 35 U.S.C. §119(a) toKorean Patent Application Serial No. 10-2013-130471 filed in the KoreanIntellectual Property Office on Oct. 30, 2013, the entire disclosure ofwhich is incorporated herein by reference.

BACKGROUND

1. Field of the Invention

The present invention relates generally to a method for controlling asecurity system of an electronic device, and an electronic devicethereof.

2. Description of the Related Art

As an electronic device, such as a smartphone, becomes more complicatedand is used more frequently in daily life, the security of theelectronic device becomes an issue. Hence, various security modes areimplemented and a user frequently sets or releases a security level.

The security mode includes, for example, a screen lock function using apassword or a pattern, a function for limiting corresponding applicationexecution using the password or the pattern, a function for limitingaccess to a file such as document, MP3, or image file using the passwordor the pattern, a function for limiting access to an important settingitem in an environment setting, and a function for limiting, duringapplication installation, download of an application from a server otherthan a corresponding server.

According to the conventional art, the user manually sets and releasesthe security mode for the corresponding task if necessary. That is, theuser sets a security type, password, or other method (e.g., the pattern)in advance and releases the security mode by inputting the presetpassword or pattern to use the electronic device. This frequentlyrequires repeated operations, such that the user needs to repeatedlyrelease the security mode even when the security mode is unnecessary.

SUMMARY

The present invention has been made to address at least theabove-described problems and disadvantages, and to provide at least theadvantages described below. Accordingly, an aspect of the presentinvention is to provide a method for applying status information of oneor more secondary electronic devices for one system operation based on asecurity environment of a first electronic device, and the first andsecond electronic devices thereof.

In accordance with an aspect of the present invention, a method of afirst electronic device is provided. The method includes obtainingwearing status information of a second electronic device which iswearable, and determining a security environment of the first electronicdevice, based on the wearing status information.

In accordance with another aspect of the present invention, a method ofa second electronic device is provided. The method includes determininga wearing status of the second electronic device, confirming a securitylevel or a user profile corresponding to the wearing status, and sendinginformation of the security level or the user profile to a firstelectronic device.

In accordance with another aspect of the present invention, a firstelectronic device is provided. The first electronic device includes amemory for storing one or more security environments, one or moreprocessors for obtaining wearing status information of a secondelectronic device which is wearable, and determining a securityenvironment of the first electronic device based on the wearing statusinformation.

In accordance with another aspect of the present invention, a secondelectronic device is provided. The second electronic device includes amemory for storing one or more security environments; one or moreprocessors for determining a wearing status of the second electronicdevice using one or more sensors, determining a security level or a userprofile corresponding to the wearing status, and sending information ofthe security level or the user profile to a first electronic device.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certainembodiments of the present invention will be more apparent from thefollowing description taken in conjunction with the accompanyingdrawings, in which:

FIG. 1A is a block diagram of an electronic device, according to anembodiment of the present invention;

FIG. 1B is a block diagram of a security processing module of anelectronic device, according to an embodiment of the present invention;

FIG. 2 illustrates a first electronic device and a secondary electronicdevice, according to an embodiment of the present invention;

FIGS. 3A, 3B and 3C illustrate the security processing by a firstelectronic device connected with a secondary electronic device attachedto a wrist strap, according to an embodiment of the present invention;

FIG. 4 illustrates the security processing by a first electronic deviceconnected with a secondary electronic device attached to a hat,according to an embodiment of the present invention;

FIG. 5 illustrates the security processing by a first electronic deviceconnected with a secondary electronic device attached to a wristband ofclothing, according to an embodiment of the present invention;

FIG. 6 illustrates the security processing by a first electronic deviceconnected with a secondary electronic device attached to eyeglasses,according to an embodiment of the present invention;

FIG. 7 is a flowchart of a security processing method of an electronicdevice, according to an embodiment of the present invention;

FIG. 8 is a flowchart of a security processing method of an electronicdevice, according to an embodiment of the present invention; and

FIG. 9 is a block diagram of hardware of an electronic device, accordingto an embodiment of the present invention.

Throughout the drawings, like reference numerals will be understood torefer to like parts, components and structures.

DETAILED DESCRIPTION OF EMBODIMENTS OF THE PRESENT INVENTION

The following description with reference to the accompanying drawings isprovided to assist in a comprehensive understanding of embodiments ofthe present invention as defined by the claims and their equivalents. Itincludes various specific details to assist in that understanding butthese are to be regarded as merely illustrative. Accordingly, those ofordinary skill in the art will recognize that various changes andmodifications of the embodiments described herein can be made withoutdeparting from the scope and spirit of the invention. In addition,descriptions of well-known functions and constructions may be omittedfor clarity and conciseness.

The terms and words used in the following description and claims are notlimited to their dictionary meanings, but are merely used to enable aclear and consistent understanding of the invention. Accordingly, itshould be apparent to those skilled in the art that the followingdescription of embodiments of the present invention is provided forillustrative purposes only and not for the purpose of limiting theinvention as defined by the appended claims and their equivalents.

It is to be understood that the singular forms “a,” “an,” and “the”include plural referents unless the context clearly dictates otherwise.Thus, for example, reference to “a component surface” includes referenceto one or more of such surfaces.

By the term “substantially” it is meant that the recited characteristic,parameter, or value need not be achieved exactly, but that deviations orvariations, including for example, tolerances, measurement error,measurement accuracy limitations, and other factors known to those ofskill in the art, may occur in amounts that do not preclude the effectthe characteristic was intended to provide.

An electronic device, according to the present invention can employ adevice having a communication function. For example, the electronicdevice can include a smart phone, a tablet Personal Computer (PC), amobile phone, a video phone, an Electronic-book reader (E-book reader),a desktop PC, a laptop PC, a netbook computer, a Personal DigitalAssistant (PDA), a Portable Multimedia Player (PMP), an MP3 player, amobile medical appliance, a camera, and a wearable device (e.g., atleast one of a Head Mounted Display (HMD), such as electronic glasses,e-textile, an electronic bracelet, an electronic necklace, an electronicaccessory, and a smart watch).

The electronic device can employ a smart home appliance having thecommunication function. The smart home appliance can include at leastone of, for example, a television (TV), a Digital Versatile Disc (DVD)player, an audio system, a refrigerator, an air conditioner, a vacuumcleaner, an oven, a microwave oven, a washing machine, an air purifier,a set-top box, a TV box (e.g., Samsung HomeSync™, AppleTV™, or GoogleTV™), a game console, an electronic dictionary, a digital key, acamcorder, and a digital frame.

The electronic device can include at least one of medical appliances(e.g., Magnetic Resonance Angiography (MRA), Magnetic Resonance Imaging(MRI), Computed Tomography (CT), X-ray, ultrasonicator), a navigationdevice, a Global Positioning System (GPS) receiver, an Event DataRecorder (EDR), a Flight Data Recorder (FDR), an in-vehicleinfotainment, marine electronic equipment (e.g., marine navigationdevice and gyro compass), avionics, and a security device.

The electronic device can include at least one of part of furniture orbuilding/structure having the communication function, an electronicboard, an electronic sign input device, a projector, and a gauge (e.g.,water, electricity, gas, or radio signal).

The electronic device can include one or a combination of those variousdevices. Notably, one skilled in the art shall understand that theelectronic device is not limited to those devices. Hereafter, theelectronic device is explained by referring to the attached drawings.The term ‘user’ can indicate a person or a device (e.g., an artificialintelligence device) who or which uses the electronic device.

FIG. 1A is a block diagram of an electronic device, according to anembodiment of the present invention.

Referring to FIG. 1A, a first electronic device 101 is provided. Thefirst electronic device 101 includes a security processing module 105, abus 110, a processor 120, a memory 130, an input/output interface module140, a display module 150, and a communication interface module 160.

The security processing module 105 controls to receive wearing statusinformation obtained by a secondary electronic device 102. The securityprocessing module 105 determines whether the wearing status informationsatisfies one or more preset conditions, and controls to determine asecurity level corresponding to the wearing status information, based onthe preset condition satisfaction. The security processing module 105determines a matching user profile among one or more user profilesrecorded to the first electronic device 101, based on the wearing statusinformation.

The security processing module 105 sets a user environment of the firstelectronic device 101, according to the determined security level or asecurity level of the user profile. The security processing module 105is able to limit functions of the first electronic device 101 byconsidering the security level determined based on the wearing statusinformation obtained by the secondary electronic device 102. Thefunction limitation based on the security level can include a screenlock function using a password or a pattern, a function for limiting thecorresponding application execution using the password or the pattern, afunction for limiting file access to document, MP3, and image file usingthe password or the pattern, a function for limiting accessibility ofimportant setting items in the environment setting, and a function forlimiting, during application installation, application downloads from aserver other than a corresponding server.

The security processing module 105 detects wearing status change of thesecondary electronic device 102 during the operation of the firstelectronic device 101, and changes the security environment (or thesecurity level) of the first electronic device 101, according to thewearing status change.

The bus 110 is a circuit for interlinking the above-stated componentsand transferring communication (e.g., control messages) between thecomponents.

The processor 120 receives an instruction from the other components(e.g., the memory 130, the input/output interface module 140, thedisplay module 150, and the communication interface module 160) of thefirst electronic device 101 via the bus 110, interprets the receivedinstruction, and performs an operation or a data processing according tothe interpreted instruction.

The memory 130 stores the instruction or the data received from orgenerated by the processor 120 or the other components (e.g., theinput/output interface module 140, the display module 150, and thecommunication interface module 160). For example, the memory 130 caninclude programming modules including a kernel 131, middleware 132, anApplication Programming Interface (API) 133, and an application 134. Theprogramming modules can be implemented using software, firmware, andhardware, or a combination of at least two of them.

The kernel 131 controls or manages system resources (e.g., the bus 110,the processor 120, or the memory 130) used to execute the operation orthe function of the other programming modules, for example, themiddleware 132, the API 133, and the application 134. The kernel 131 canprovide an interface allowing the middleware 132, the API 133, or theapplication 134 to access and control or manage the individual componentof the first electronic device 101.

The middleware 132 relays data between the API 133 or the application134 and the kernel 131. The middleware 132 can perform load balancing ofwork requests received from the applications 134 by giving priority ofthe system resource (e.g., the bus 110, the processor 120, or the memory130) of the first electronic device 101 to at least one of theapplications 134.

The API 133, which is an interface for the application 134 to controlthe kernel 131 or the middleware 132, can include at least one interfaceor function for file control, window control, image processing, or textcontrol.

The input/output interface module 140 receives and forwards theinstruction or the data from the user to the processor 120 or the memory130 via the bus 110. The display module 150 displays an image, a video,or data to the user. When the display module 150 is a touch screenpanel, the instruction can be input using a gesture which touches orhovers over (e.g., indirectly touches) the display module 150.

The communication interface module 160 connects the communicationbetween the first electronic device 101 and the secondary electronicdevices 102 or between an electronic device 104 and a server 164. Thecommunication interface module 160 can support short-range communicationprotocol (e.g., Wi-Fi, Bluetooth (BT), Near Field Communication (NFC)),or a communication network 162 (e.g., Internet, Local Area Network(LAN), Wide Area Network (WAN), telecommunication network, cellularnetwork, satellite network, or Plain Old Telephone Service (POTS)). Theelectronic devices 102 and 104 can be the same as or different from thefirst electronic device 101.

FIG. 1B is a block diagram of a security processing module of a firstelectronic device 101, according to an embodiment of the presentinvention.

Referring to FIG. 1B, the security processing module 105 includes one ormore of a detection module 210, an acquisition module 220, and aprovision module 230.

The detection module 210 detects the wearing status change of thesecondary electronic device 102 based on the wearing status informationreceived from the secondary electronic device 102. The secondaryelectronic device 102 periodically sends its wearing status informationto the first electronic device 101, and the first electronic device 101detects the wearing status change of the secondary electronic device 102based on one or more wearing status information received.

The acquisition module 220 receives the wearing status informationacquired by the secondary electronic device 102 or the security leveland user profile determined based on the wearing status information. Theacquisition module 220 receives the wearing status information of thesecondary electronic device 102 or the security level and user profiledetermined, based on the wearing status information, from the connectedsecondary electronic device 102 through a communication module for oneor more network communications of the first electronic device 101.

The provision module 230 provides the first electronic device 101 withthe user environment corresponding to the security level of theinformation acquired by the secondary electronic device 102. Theprovision module 230 provides a menu for inputting an identificationcode, such as password or pattern, required to operate the firstelectronic device 101 according to the determined user environment.During operation of the first electronic device 101, the provisionmodule 230 periodically refers to the wearing status information or thenetwork communication environment of the secondary electronic device102. When detecting abnormality of the wearing status of the electronicdevice 102 or the data transmission/reception of the networkcommunication, the provision module 230 controls the security level ofthe first electronic device 101 in a predetermined manner.

FIG. 2 illustrates a first electronic device and a secondary electronicdevice, according to an embodiment of the present invention.

Referring to FIG. 2, the first electronic device 101 includes a speaker307 for outputting sound, a button 301 on an upper side, a lower side, afront side, or a back side, as one of input devices for inputting aninstruction by clicking the button 301, and a touch button 303 or 305 ata fixed location for inputting an instruction through the touch. Thefirst electronic device 101 can include at least one microphone (notshown) for inputting an external sound of the first electronic device101 at a location exposed outside the first electronic device 101 forthe sound input. The first electronic device 101 can include the displaymodule 150 on its front side, and display its User Interface (UI)operation through the display module 150.

While the speaker 307, the button 301, or the touch button 303 or 305are not depicted, the secondary electronic device 102 can includespeaker 307, the button 301, or the touch button 303 or 305 at the samelocations or at different locations.

Referring to FIG. 2, the first electronic device 101 can change itssecurity level based on a preset input. When the display module 150 isturned on, the first electronic device 101 provides a menu for changingthe highest security level. The first electronic device 101 provides aregion for inputting the password on the display module 150 being turnedon. The password can be input to the first electronic device 101 invarious manners using, for example, a region for inputting characters,symbols, numbers, or a character string combining one or more of them, aregion for inputting the pattern, or sound input.

To change the security level, the first electronic device 101 can alsoapply the security function of one or more secondary electronic devices102 connected through the network communication. When changing thesecurity level at the point of an active mode (e.g., the turn-on of thedisplay module 150), the first electronic device 101 receives securitylevel from the one or more connected secondary electronic devices 102.The secondary electronic device 102 can be a wearable electronic device.When the secondary electronic device 102 is worn, the first electronicdevice 101 checks the wearing status and determines whether the wearingstatus information satisfies the condition which defines the securitylevel. The first electronic device 101 obtains the wearing statusinformation of the secondary electronic device 102 through one or moresensors attached. The first electronic device 101 receives the wearingstatus information from the secondary electronic device 102, anddetermine whether the use of the first electronic device 101 isauthorized based on the wearing status information. When the displaymodule 150 is turned on and the wearing status information received fromthe secondary electronic device 102 is the status information approvingthe use of the first electronic device 101, the first electronic device101 provides the menu for changing its security level, such as passwordinput region. When a correct password is input, the first electronicdevice 101 may lower its security level or switch to the security levelnot limiting its use. While the secondary electronic device 102 is worn,the changed security level of the first electronic device 101 ismaintained.

Alternatively, the first electronic device 101 determines the user ofthe secondary electronic device 102 based on the wearing statusinformation received from the secondary electronic device 102, andprovides the user profile corresponding to the user. The firstelectronic device 101 can set profiles of one or more users (e.g., afirst user and a second user). When the wearing status information fromthe secondary electronic device 102 relates to the first user, the firstelectronic device 101 applies the user profile to the first user. Whenthe display module 150 is turned on, the first electronic device 101provides the password input region applied to the first user. When thepassword corresponding to the first user is input correctly, the firstelectronic device 101 may change the first user profile security level.

When the password of the second user or an incorrect password is inputto the password input region while the secondary electronic device 102is worn by the first user, the first electronic device 101 does notallow a change of the security level by the user and changes thesecurity level to the highest level for limiting the first electronicdevice 101. When the wearing status information received from thesecondary electronic device 102 indicates that the secondary electronicdevice 102 is not being worn or the user profile is not designated(e.g., incorrect wearing), the first electronic device 101 does notprovide a password input region for changing the security level andchanges the security level to the highest level, which may be doneautomatically.

While the first electronic device 101 can determine the user profilebased on the wearing status information received from the secondaryelectronic device 102, the first electronic device 101 may receive theuser profile determined based on the wearing status information from thesecondary electronic device 102 and set the user environment based onthe user profile. When the secondary electronic device 102 sends theuser profile to the first electronic device 101 and shares the same userinformation with the first electronic device 101, the secondaryelectronic device 102 may send an identification code indicative of theuser profile as the user profile. When the secondary electronic device102 sends the user profile including additional information which is notincluded in the first electronic device 101, the user profile caninclude a preset protocol data for the first electronic device 101, andthe first electronic device 101 applies the received information.

FIGS. 3A, 3B and 3C illustrate the security processing by a firstelectronic device connected with a secondary electronic device attachedto a wrist strap, according to an embodiment of the present invention.

Referring to FIGS. 3A, 3B and 3C, the secondary electronic device 102can be a device attached to a strap, such as wrist watch.

Referring to FIG. 3A, the strap of the secondary electronic device 102is fastened by fitting a tongue 311 of a buckle into a hole 313, 315, or317. To determine the wearing status of the secondary electronic device102, when the secondary electronic device 102 is the wrist watch, thebuckle tongue and the holes can be connected to a main body of thesecondary electronic device 102 using a conducting wire mounted at apreset location of the strap. When the hole 313, 315, or 317 of thestrap of the secondary electronic device 102 is fastened to the tongue311, it can be designed to flow a preset current quantity (a presetresistance of the hole) through the hole or to generate a presetconnection signal (e.g., an electromagnetic signal), and detect thefastened buckle through a module (e.g., a module for detecting theconnection through resistance or a ground (GND) component) for detectingwhether the buckle is correctly fastened. After determining theconnection through the module, a dual structure may determine theconnection status of the tongue and the hole. When the tongue isfastened to one hole, the secondary electronic device 102 obtains thewearing status information from the current quantity or the connectionsignal of the hole. The secondary electronic device 102 sends thewearing status information to the first electronic device 101, and thefirst electronic device 101 determines the user of the secondaryelectronic device 102 based on the obtained wearing status information.The secondary electronic device 102 determines the user profile based onthe obtained wearing status information. For example, when the tongue311 is fastened to the hole 313 of the strap, the secondary electronicdevice 102 retrieves the preset user information from its database basedon the acquired current quantity or connection signal. When the obtainedcurrent quantity or connection signal satisfies first user information,the secondary electronic device 102 sends the first user profile to thefirst electronic device 101. Further, the secondary electronic device102 may retrieve the preset user information with the obtained currentquantity or connection signal or sensor information obtained by one ormore sensors. Even when the tongue and the hole of the strap arefastened, the secondary electronic device 102 can obtain its temperatureor an object temperature through a temperature sensor. When the obtainedtemperature corresponds to a preset temperature range of an externalelectronic device, the secondary electronic device 102 determines theuser information corresponding to the obtained current quantity orconnection signal.

The first electronic device 101 receives the wearing status informationor the user profile determined based on the wearing status informationfrom the secondary electronic device 102. Upon receiving the wearingstatus information, the first electronic device 101 determines the userprofile including the wearing status information in its database basedon the wearing status information. The first electronic device 101determines its security level according to the user profile and providesa function according to the security level. For example, for the firstuser profile, the first electronic device 101 provides a menu forinputting a password when the display module 150 is turned on, and maylower the security level when the correct password is input. When thepreset user information is not input, the first electronic device 101detects the input for turning on the display module 150 at the securitylevel which locks the first electronic device 101, and receives thefirst user profile from the connected secondary electronic device 102when the display module 150 is turned on. The first electronic device101 provides a menu for inputting the password according to the firstuser profile received. When the correct password is input, the firstelectronic device 101 releases the lock function and provides thesecurity level function (e.g., change the security level) correspondingto the first user profile. When an incorrect password is input, thefirst electronic device 101 stays in the lock mode and prevents accessby the first user.

When the correct password is input and the wearing status of thesecondary electronic device 102 is changed or the network communicationremains connected to the first electronic device 101 at the securitylevel corresponding to the user information, the first electronic device101 maintain the current security level though the display module 150 isturned off.

When the network communication is disconnected from the secondaryelectronic device 102, the data transmission falls below a preset level,or the correct buckle connection is not detected due to the damagedstrap of the secondary electronic device 102 or the damaged secondaryelectronic device 102, the first electronic device 101 changes itssecurity level to the original security level or a higher security levelthrough the password input.

Referring to FIG. 3B, the secondary electronic device 102 can include amodule 323, 325, or 327 for detecting a tongue 321 of the buckle fittinginto a hole 322, 324, or 326 of the strap, at a preset location based onthe hole. For example, when the buckle tongue 321 is fastened to one(e.g., the hole 322 connected to the module 323) of the one or moreholes of the strap, the module 323 sends a preset signal of the hole 322to the main body of the secondary electronic device 102 through a presetconducting wire of the strap. The secondary electronic device 102determines the security level corresponding to the preset signalobtained by the module 323, and sends the security level to the firstelectronic device 101 connected via the network communication. The firstelectronic device 101 controls its content security level based on theobtained security level.

Referring to FIG. 3C, besides the information obtained from theconnection of the buckle tongue and the hole, the secondary electronicdevice 102 can obtain its wearing status information through one or moresensors connected. The secondary electronic device 102 can include oneor more of a proximity sensor, a touch sensor, a grip sensor, a wave(pulse or pulse wave) sensor, a temperature sensor, a fingerprintsensor, and a tension sensor, and obtain its status information (e.g.,wearing status information) from the attached sensor. The secondaryelectronic device 102 can include a proximity sensor 331 at a presetlocation (e.g., on the back side of the main body of the secondaryelectronic device 102) of the main body or the strap. When the secondaryelectronic device 102 is worn, the proximity sensor 331 can obtain asignal corresponding to the wearing status of the secondary electronicdevice 102. Alternatively, the secondary electronic device 102 caninclude a temperature sensor 333 at a preset location (e.g., in a regioncontacting the object when the strap of the secondary electronic device102 is fastened) of the main body or the strap. When the secondaryelectronic device 102 is worn, the temperature sensor 333 can obtaintemperature information of the object wearing the secondary electronicdevice 102. Alternatively, the secondary electronic device 102 caninclude a grip sensor 335 at a preset location (e.g., in a regioncontacting the object when the strap of the secondary electronic device102 is fastened) of the main body or the strap. When the secondaryelectronic device 102 is worn, the grip sensor 335 obtains contactinformation of the object wearing the secondary electronic device 102.The grip sensor 335 may obtain an electromagnetic signal pattern of thecontacted object.

The secondary electronic device 102 or the first electronic device 101can determine the preset user information (e.g., the user profile) usingone or more sensor information obtained by the secondary electronicdevice 102, and can also determine the security level corresponding tothe obtained sensor information. The first electronic device 101 canprovide a security service by additionally applying content provisionbased on the determined user information or security level.

FIG. 4 illustrates the security processing of an electronic deviceconnected with a secondary electronic device attached to a hat,according to an embodiment of the present invention.

Referring to FIG. 4, the secondary electronic device 102 can be awearable device including a band for adjusting the size or a deviceattached to wearable clothes, shoes, hats, gloves, or accessories. Whenthe secondary electronic device 102 is attached to a hat, the bands ofthe hat can be secured by attaching or fastening two or more bands, suchas Velcro to one or more regions of the band. For example, a first band407 contains preset regions, rather than a fixed location, for attachinga second band. The second band 409 contains specified regions, such as afirst region 401, a second region 403, and a third region 405. In thesecondary electronic device 102 attached to the hat for adjusting thesize using two bands, when part of preset regions of a first band 407and one of the regions (e.g., the first region 401, the second region403, or the third region 405) of the second band 409 are coupled, thesecondary electronic device 102 can be designed to flow the current orto issue the connection signal corresponding to the first region 401,the second region 403, or the third region 405 of the second band 409.When the first band 407 and the second band 409 are fastened, thesecondary electronic device 102 obtains the corresponding current orconnection signal and the wearing status information through its one ormore sensors attached to the hat. The secondary electronic device 102obtains the wearing status information through one or more sensors forchecking the wearing status of the hat, such as proximity sensor, touchsensor, and temperature sensor. The secondary electronic device 102sends, to the first electronic device 101, the sensor information,obtained from the connected one or more sensors of the secondaryelectronic device 102 attached to the hat, and the wearing statusinformation. The first electronic device 101 determines the user profilebased on the received wearing status information. The first electronicdevice 101 determines whether the hat, including the secondaryelectronic device 102, is worn, based on the received wearing statusinformation obtained from the sensor information measured by the one ormore sensors connected to the secondary electronic device 102. When thehat including the secondary electronic device 102 is worn, the firstelectronic device 101 determines the user profile based on the currentquantity or connection signal information obtained from the connectionof the first band 407 and the second band 409. To determine the userprofile, the first electronic device 101 or the secondary electronicdevice 102 includes the user profile corresponding to the currentquantity or the connection signal information when the preset region ofthe first band 407 and the first region 401 of the second band 409 arefastened, the current flow or the connection signal information when thepreset region of the first band 407 and the second region 403 of thesecond band 409 are fastened, and the current flow or the connectionsignal information when the preset region of the first band 407 and thethird region 405 of the second band 409 are fastened. That is, when thehat including the secondary electronic device 102 is worn, the firstelectronic device 101 determines the user profile corresponding to theconnection of the preset region of the first band 407 and the firstregion 401, the second region 403, or the third region 405 of the secondband 409 and based on the wearing status information. Alternatively,when the hat is worn, the secondary electronic device 102 sends to thefirst electronic device 101 the determined user profile corresponding tothe connection of the preset region of the first band 407 and the firstregion 401, the second region 403, or the third region 405 of the secondband 409 and based on the wearing status information.

Based on the wearing status information of the secondary electronicdevice 102 connected via the network communication, the first electronicdevice 101 is able to control its security level change. When thewearing status information of the secondary electronic device 102corresponds to the user authorized to control the security level of thefirst electronic device 101, the first electronic device 101 is able tochange its security level according to a security level change commandinput. When changing the security level according to the input command,the first electronic device 101 is able to limit the change of thesecurity level based on the security level corresponding to the userprofile determined by the wearing status information of the secondaryelectronic device 102.

FIG. 5 illustrates the security processing by an electronic deviceconnected with a secondary electronic device attached to a wristband ofclothing, according to an embodiment of the present invention.

Referring to FIG. 5, the secondary electronic device 102 can be awearable device including a band for adjusting the size according to thetension, or a device attached to wearable clothes, shoes, hats, gloves,or accessories. When the secondary electronic device 102 is attached toclothes, a wristband 501 of the clothes can adjust its size using thetension from the part of the body passing through the wristband 501. Inthe secondary electronic device 102 attached to the clothes includingthe wristband 501 size-adjusted by the tension, the secondary electronicdevice 102 can be designed to flow the current or to issue theconnection signal so as to measure a value corresponding to the presettension of the wristband 501. The secondary electronic device 102obtains the wearing status information from the current quantity or theconnection signal corresponding to the tension of the wristband 501 andone or more sensors attached to the clothes. The secondary electronicdevice 102 obtains the wearing status information from one or moresensors for checking the wearing status of the clothes, such as aproximity sensor, a touch sensor, and a temperature sensor. Thesecondary electronic device 102 sends to the first electronic device 101the sensor information obtained from its connected one or more sensorsattached to the clothes, the value corresponding to the tension appliedto a tension sensor of the wristband 501, and the wearing statusinformation such as current quantity or connection signal. The firstelectronic device 101 determines the user profile based on the receivedwearing status information.

The first electronic device 101 can determine whether the clothes,including the secondary electronic device 102 is worn, based on receivedwearing status information obtained from the sensor information measuredby the one or more sensors connected to the secondary electronic device102. When the clothes, including the secondary electronic device 102 areworn, the first electronic device 101 determines the user profile basedon the tension information applied to the tension sensor of thesecondary electronic device 102.

FIG. 6 illustrates the security processing by an electronic deviceconnected with a secondary electronic device 102 attached to eyeglasses,according to an embodiment of the present invention.

Referring to FIG. 6, the secondary electronic device 102 can be a deviceattached to wearable clothes, shoes, hats, gloves, or accessories. Forexample, the secondary electronic device 102 can be eyeglasses or adevice attached to a preset location of the eyeglasses together with oneor more sensors. When the secondary electronic device 102 is attached tothe eyeglasses, the secondary electronic device 102 obtains the wearingstatus information of the eyeglasses from a tension sensor for measuringthe tension applied to a frame of the eyeglasses being worn, and atemperature sensor attached to a preset location (e.g., at the templesor a bridge 601 or 607) of the eyeglass frame.

The first electronic device 101 or the secondary electronic device 102determines the user profile based on the obtained wearing statusinformation. For example, the first electronic device 101 determines theuser profile satisfying the tension value obtained by the tension sensorand the temperature measured by the temperature sensor, by referring tothe wearing status information of the secondary electronic device 102.For example, the secondary electronic device 102 provides the determineduser profile to the first electronic device 101 and reinforces thesecurity of the first electronic device 101.

The first electronic device 101 provides a security environmentcorresponding to the determined user profile. The first electronicdevice 101 can display a service based on the security levelcorresponding to the user profile determined based on the wearing statusinformation when the display module 150 is turned on. For example, thefirst electronic device 101 can display a lock screen of the determinedsecurity level on the display module 150, and release the lock screenaccording to a user's input. The first electronic device 101 is able tochange the security level by releasing the lock screen. When the wearingstatus information of the secondary electronic device 102 stays below apreset value or an error range, the security level of the firstelectronic device 101 is maintained. For example, the first electronicdevice 101 provides a menu for inputting a password or a pattern tochange the security level on the screen when the display module 150 isturned on, and changes the security environment at the preset securitylevel by receiving an input of the correct password or pattern. When thedisplay module 150 of the first electronic device 101 is turned off, thefirst electronic device 101 returns to the original security level priorto input of the password or pattern. In this case, at the security levelof the user profile determined based on the wearing status informationof the connected secondary electronic device 102, the first electronicdevice 101 changes its security level according to the authority basedon the wearing status information of the secondary electronic device102. When the wearing status of the secondary electronic device 102 doesnot change and the display module 150 of the first electronic device 101is turned off, the first electronic device 101 maintains the lockrelease (e.g., the changed security level) without changing the securitylevel according to the setting.

At the security level of the user profile determined based on thewearing status information of the secondary electronic device 102connected, when the wearing status information of the secondaryelectronic device 102 is switched to the wear release or the wearingstatus of the secondary electronic device 102 is changed, for example,when the first electronic device 101 and the secondary electronic device102 are disconnected (e.g., the disconnection of the networkcommunication), the security level of the first electronic device 101can be changed to the security level before the lock release or to thepreset security level (e.g., the highest security level).

Alternatively, the first electronic device 101 can notify a user of thewearing status information of the secondary electronic device 102 bydisplaying the wearing status change information of the secondaryelectronic device 102 through the display module 150, outputting thesound indicative of the wearing status change through a speaker, orvibrating in a preset pattern.

FIG. 7 is a flowchart of a security processing method of an electronicdevice, according to an embodiment of the present invention.

The first electronic device 101 is able to control its security levelbased on the wearing status information or the user profile receivedfrom the secondary electronic device 102.

In step 701, the first electronic device 101 determines whether thewearing status information obtained by the wearable secondary electronicdevice 102 connected via the network communication satisfies a presetcondition. For example, the secondary electronic device 102 obtains thewearing status information through one or more sensors. The firstelectronic device 101 or the secondary electronic device 102 determineswhether the obtained wearing status information satisfies one or morepreset conditions for controlling the security level in the securityenvironment of the first electronic device 101. If the obtained wearingstatus information satisfies one or more preset conditions forcontrolling the security level, then the electronic device proceeds tostep 703. If one or more preset conditions for controlling the securitylevel is not satisfied, then the process ends.

In step 703, the first electronic device 101 determines the securitylevel according to the condition satisfied by the wearing statusinformation of the secondary electronic device 102. The first electronicdevice 101 determines whether the wearing status information of thesecondary electronic device 102 satisfies one or more security levels ofthe first electronic device 101, and provides the user environment atthe determined security level.

The first electronic device 101 checks the authority for providing theuser environment at the security level determined by the secondaryelectronic device 102. For example, the first electronic device 101receives an identification code, such as a password or pattern, foraccessing the user environment at the security level. When the inputidentification code is correct, the first electronic device 101 providesthe authorized user environment at the security level.

In step 705, the first electronic device 101 or the secondary electronicdevice 102 determines whether the wearing status of the secondaryelectronic device 102 is changed during the operation of the firstelectronic device 101 according to the authorized security level. Forexample, when the preset condition is or is not satisfied at the presetlocation such as buckle (pin or hole) or tension sensor, the secondaryelectronic device 102 sends, to the first electronic device 101, thechanged wearing status information or the security level determinedbased on the wearing status information. Alternatively, the firstelectronic device 101 detects an error (e.g., disconnection) of the datatransmission/reception of the network communication with the secondaryelectronic device 102 during its operation according to the grantedauthority of the determined security level.

When detecting a change of the wearing status information or the networkcommunication of the secondary electronic device 102, the firstelectronic device 101 proceeds to step 709. Otherwise, the firstelectronic device 101 proceeds to step 707.

In step 707, when the wearing status of the secondary electronic device102 does not change, the first electronic device 101 maintains thecurrent security level and security environment during the operation atthe determined security level. For example, when the display module 150is turned off, the first electronic device 101 maintains the securityrelease according to the setting which controls to change the securitylevel of the security release (the security status of the firstelectronic device 101 with the granted authority) to the security levelof the lock, without locking the security level.

In step 709, the first electronic device 101 resets the security level.When detecting the changed wearing status of the secondary electronicdevice 102 at the current security level (e.g., the security level ofthe first electronic device 101 with the authority authorized accordingto the identification code), the first electronic device 101 changes itssecurity level. For example, when the secondary electronic device 102 istaken off while at a low security level according to the identificationcode, the first electronic device 101 changes the security level to thehighest security level. When changing the security level to the highestsecurity level, the first electronic device 101 may output informationindicating that the secondary electronic device 102 has been taken off.

After step 707 or 709, the process of FIG. 7 ends.

FIG. 8 is a flowchart of a security processing method of an electronicdevice, according to an embodiment of the present invention.

The first electronic device 101 is able to control its security levelbased on the wearing status information or the user profile receivedfrom the secondary electronic device 102.

In step 801, the first electronic device 101 determines whether thewearing status information obtained by the wearable secondary electronicdevice 102 connected via the network communication satisfies the presetcondition. For example, the secondary electronic device 102 obtains itswearing status information through one or more sensors. The firstelectronic device 101 or the secondary electronic device 102 determineswhether the obtained wearing status information satisfies one or morepreset conditions for controlling the security level in the securityenvironment of the first electronic device 101. The preset condition canbe satisfied by determining the user profile meeting the obtainedwearing status information among one or more user profiles recorded tothe first electronic device 101 or the secondary electronic device 102.If the obtained wearing status information satisfies one or more presetconditions for controlling the security level, then the electronicdevice proceeds to step 803. If one or more preset conditions forcontrolling the security level is not satisfied, then the process ends.

In step 803, the first electronic device 101 provides an operationaccording to the security level of the determined user profile. Thefirst electronic device 101 and the secondary electronic device 102 canshare one or more same user profiles. When the user profile determinedby the wearing status information of the secondary electronic device 102is absent in the first electronic device 101, the secondary electronicdevice 102 sends, to the first electronic device 101, the security levelof the determined user profile and the information for providing thesecurity environment corresponding to the user profile via aninstruction prearranged with the first electronic device 101. The firstelectronic device 101 confirms the user profile determined by thesecondary electronic device 102. For example, the first electronicdevice 101 receives an identification code, such as a password orpattern, for accessing the user environment of the first electronicdevice 101 provided at the security level of the user profile.Alternatively, the first electronic device 101 receives information forautomatically controlling the security level according to the userprofile determined by the secondary electronic device 102.

In step 805, when the input identification code is correct, the firstelectronic device 101 changes the security level according to thegranted authority of the user profile. For example, when receiving theuser profile from the secondary electronic device 102, the firstelectronic device 101 provides the user environment at the securitylevel according to the received user profile.

In step 807, the first electronic device 101 or the secondary electronicdevice 102 determines whether the wearing status of the secondaryelectronic device 102 is changed during the operation of the firstelectronic device 101 according to the authorized user profile. Forexample, when the connection of the sensor or the device providing theinformation to determine the user profile according to the presetlocation such as buckle (pin or hole) or tension sensor, the secondaryelectronic device 102 sends the change information to the firstelectronic device 101. Alternatively, the first electronic device 101detects an error (e.g., disconnection) of the datatransmission/reception of the network communication with the secondaryelectronic device 102 during its operation of the first electronicdevice 101 according to the granted authority of the determined securitylevel.

When detecting a change of the wearing status information or the networkcommunication of the secondary electronic device 102, the firstelectronic device 101 proceeds to step 811. Otherwise, the firstelectronic device 101 proceeds to step 809.

In step 811, the first electronic device 101 resets the security level.When detecting the changed wearing status of the secondary electronicdevice 102 at the current security level (e.g., the security level ofthe first electronic device 101 with the authority granted based on theidentification code), the first electronic device 101 changes itssecurity level. For example, when the secondary electronic device 102 istaken off while at a low security level according to the identificationcode, the first electronic device 101 changes the security level to thehighest security level. When changing the security level to the highestsecurity level, the first electronic device 101 may output theinformation indicating that the secondary electronic device 102 has beentaken off. When the first electronic device 101 outputs the informationindicating that the secondary electronic device 102 is taken off and thesecondary electronic device 102 is put on again, according to thewearing status information, within a preset time, the first electronicdevice 101 operates under the granted authority of the user profile withthe identification code input at a lower security level than thesecurity level of the user profile determination.

When the secondary electronic device 102 is taken off or the connectionof the network communication with the first electronic device 101 has anerror, the first electronic device 101 releases the current userprofile.

In step 809, the first electronic device 101 maintains the currentsecurity level and security environment during an operation of theauthorized user. For example, when the display module 150 is turned off,the first electronic device 101 maintains the security release accordingto the setting which controls to change the security level of thesecurity release (the security status of the first electronic device 101with the granted authority) to the security level of the lock status ofthe corresponding user, without locking the security level.

After step 809 or 811, the process of FIG. 8 ends.

The first electronic device 101 can provide a service by applying theuser profile determined based on the wearing status information of thesecondary electronic device 102, and may select (or determine) the userand serve as a secondary security device for the operations, except forthe user profile determination, based on the wearing status informationof the secondary electronic device 102.

An operating method of a first electronic device 101 includes obtainingwearing status information of a secondary electronic device 102 which iswearable, and determining a security environment of the first electronicdevice based on the wearing status information.

When a user puts the secondary electronic device 102 on and then theuser is determined as a preset user according to the wearing statusinformation obtained, the first electronic device 101 may lower asecurity level of the security environment.

When the secondary electronic device 102 is a watch type, the wearingstatus information detects that a preset hole of the secondaryelectronic device 102 is used when a user wears the secondary electronicdevice 102.

The wearing status information can be determined using one or more of afingerprint sensor, an iris sensor, a pulse wave sensor, a temperaturesensor, a grip sensor, and a tension sensor, which are connected to thesecondary electronic device 102.

The secondary electronic device 102 can be connected to the firstelectronic device 101 through one or more network communications.

The wearing status information is periodically obtained when the firstelectronic device 101 and the secondary electronic device 102 areconnected.

The security level is included in a user profile determined based on thewearing status information.

A content range is able to be limited based on the security level,according to the security environment, by applying the security level toall or part of the content of the first electronic device 101.

The method further includes, after determining the security level,detecting a change of the received wearing status information orreceiving no wearing status information. The method further includeschanging the security environment of the first electronic device 101 ina preset manner and providing a content corresponding to the changedsecurity environment.

An operating method of the first electronic device 101 includesdetermining a wearing status of the first electronic device 101,determining a security level or a user profile corresponding to thewearing status, and sending information of the security level or theuser profile to a secondary electronic device 102. The first electronicdevice 101 can include one or more of a fingerprint sensor, an irissensor, a pulse wave sensor, a temperature sensor, a grip sensor, and atension sensor, and determines wearing status information of the firstelectronic device 101 using one or more of the sensors.

FIG. 9 is a block diagram of hardware of an electronic device, accordingto an embodiment of the present invention.

Referring to FIG. 9, the hardware 900 can configure all or part of thefirst electronic device 101 of FIG. 1. The hardware 900 can include oneor more processors 910, a Subscriber Identity Module (SIM) card 914, amemory 920, a communication module 930, a sensor module 940, a userinput module 950, a display module 960, an interface 970, an audio codec980, a camera module 991, a power management module 995, a battery 996,an indicator 997, and a motor 998.

The processor 910 (e.g., the processor 120) can include one or moreApplication Processors (APs) 911 and one or more CommunicationProcessors (CPs) 913. For example, the processor 910 can be theprocessor 120 of FIG. 1. While the AP 911 and the CP 913 are included inthe processor 910 of FIG. 9, the AP 911 and the CP 911 can be includedin different Integrated Circuit (IC) packages. The AP 911 and the CP 911may be included in a single IC package.

The AP 911 controls a plurality of hardware or software componentsconnected to the AP 911 by driving an operating system or an applicationprogram, and carries out data processing and operations includingmultimedia data. The AP 911 can be implemented using, for example, aSystem on Chip (SoC). The processor 910 can further include a GraphicsProcessing Unit (GPU).

The CP 913 manages data links and converts a communication protocol inthe communication between the first electronic device 101 including thehardware 900 and the other electronic devices connected over thenetwork. The CP 913 can be implemented using, for example, a SoC. The CP913 performs at least part of a multimedia control function. The CP 913identifies and authenticates a terminal in the communication networkusing the SIM card 914. In so doing, the CP 913 can provide the userwith services including voice telephony, video telephony, text message,and packet data.

The CP 913 controls the data transmission and reception of thecommunication module 930. While the components of the CP 913, the powermanagement module 995, and the memory 920 are separated from the AP 911in FIG. 9, the AP 911 can include part (e.g., the CP 913) of thosecomponents.

The AP 911 or the CP 913 loads and processes the instruction or the datareceived from its non-volatile memory or at least one of the othercomponents, in a volatile memory. The AP 911 or the CP 913 stores datareceived from or generated by at least one of the other components, inthe non-volatile memory.

The SIM card 914 can be inserted to a slot formed at a specific locationof the electronic device. The SIM card 914 can include uniqueidentification information (e.g., Integrated Circuit Card Identifier(ICCID)) or subscriber information (e.g., International MobileSubscriber Identity (IMSI)).

The memory 920 includes an internal memory 922 and an external memory924. For example, the memory 920 can be the memory 130 of FIG. 1. Theinternal memory 922 can include at least one of the volatile memory(e.g., Dynamic Random Access Memory (DRAM), Static RAM (SRAM),Synchronous DRAM (SDRAM)) and the non-volatile memory (e.g., One-TimeProgrammable Read Only Memory (OTPROM), PROM, Erasable PROM (EPROM),Electrically EPROM (EEPROM), mask ROM, flash ROM, NAND flash memory, NORflash memory). The internal memory 922 may employ a Solid State Drive(SSD). The external memory 924 can further include a flash drive, forexample, a Compact Flash (CF), a Secure Digital (SD), a Micro-SD, aMini-SD, an extreme digital (xD), and a memory stick.

The communication module 930 can include a wireless communication module931 and a Radio Frequency (RF) module 934. For example, thecommunication module 930 can be the communication module 170 of FIG. 1.For example, the wireless communication module 931 can include a Wi-Fi933, a BT 935, a GPS 937, and an NFC 939. For example, the wirelesscommunication module 931 can provide a wireless communication functionusing a radio frequency. Additionally, the wireless communication module931 can include a network interface (e.g., LAN card) or a modem forconnecting the hardware 900 to the network (e.g., Internet, LAN, WAN,telecommunication network, cellular network, satellite network, orPOTS).

The RF module 934 can control the data transmission and reception, forexample, the transmission and reception of the RF signal or a calledelectric signal. For example, the RF module 934 can includes atransceiver, a Pulse Amplitude Modulation (PAM), a frequency filter, ora Low Noise Amplifier (LNA), which is not depicted in the drawing. TheRF module 934 can further include a component, for example, a conductoror a conducting wire, for sending and receiving electromagnetic waves ina free space in the wireless communication.

The sensor module 940 can include at least one of, for example, agesture sensor 940A, a gyro sensor 940B, an atmospheric pressure sensor940C, a magnetic sensor 940D, an acceleration sensor 940E, a grip sensor940F, a proximity sensor 940G, a Red Green Blue (RGB) sensor 940H, abiometric sensor 940I, a temperature/humidity sensor 940J, a lightsensor 940K, and an UltraViolet (UV) sensor 940M. The sensor module 940measures a physical quantity or detects the operation status of theelectronic device, and converts the measured or detected information toan electric signal. Additionally, the sensor module 940 can include anE-noise sensor, an electromyography (EMG) sensor, anelectroencephalogram (EEG) sensor, an electrocardiogram (ECG) sensor, ora finger print sensor. The sensor module 940 can further include acontrol circuit for controlling its one or more sensors.

The user input module 950 can include a touch panel 952, a (digital) pensensor 954, a key 956, and an ultrasonic input device 958. For example,the user input module 950 can be the input/output interface module 140of FIG. 1. The touch panel 952 can recognize the touch input using atleast one of capacitive, resistive, infrared, and Surface Acoustic Wave(SAW) techniques. The touch panel 952 may further include a controller.The capacitive touch panel can recognize not only the direct touch butalso the proximity. The touch panel 952 may further include a tactilelayer. In this case, the touch panel 952 provides a tactile response tothe user.

The (digital) pen sensor 954 can be implemented using the same or asimilar method as the user's touch input, or using a separaterecognition sheet. The key 956 can include, for example, a keypad or atouch key.

The ultrasonic input device 958, which obtains data by detectingmicrowave through a microphone 988 in the terminal, allows radiofrequency identification through the pen which generates an ultrasonicsignal. The hardware 900 may receive the user input from an externaldevice (e.g., a network, a computer, or a server) connected using thecommunication module 930.

The display module 960 can include a panel 962 or a hologram 964. Forexample, the display module 960 can be the display module 150 of FIG. 1.The panel 962 can employ, for example, a Liquid Crystal Display (LCD) oran Active Matrix Organic Light Emitting Diode (AMOLED). The panel 962can be implemented flexibly, transparently, or wearably. The panel 962may be constructed as a single module together with the touch panel 952.The hologram 964 can present a three-dimensional image in the air usinginterference of light. The display module 960 can further include acontrol circuit for controlling the panel 962 and the hologram 964.

The interface 970 can include, for example, a High Definition MultimediaInterface (HDMI) 972, a Universal Serial Bus (USB) 974, a projector 976,and a D-sub 978. Additionally/substantially, the interface 970 caninclude, for example, a SD/MMC (not shown) or IrDA (not shown).

The audio codec 980 converts voice data to an electronic signal and viceversa. For example, the audio codec 980 can convert voice informationwhich is input or output through a speaker 982, a receiver 984, anearphone 986, or the microphone 988.

The camera module 991 can capture a still picture and a moving picture.For example, the camera module 991 can include one or more image sensors(e.g., front lens or rear lens), an Image Signal Processor (ISP), or aflash LED.

The power management module 995 manages power of the hardware 900. Thepower management module 995 can include, for example, a Power ManagementIC (PMIC), a charging IC, or a battery gauge.

For example, the PMIC can be mounted in an IC or a SoC semiconductor.The charging type can be a wired type and a wireless type. The chargingIC can charge the battery and prevent overvoltage or overcurrent fromflowing from a charger. For example, the charging IC can include acharging IC for at least one of the wired charging type or the wirelesscharging type. For example, the wireless charging type includes magneticresonance, magnetic induction, and microwave, and can further include anadditional circuit such as coil loop, resonance circuit, rectifiercircuit for the wireless charging.

The battery gauge can measure, for example, the remaining capacity ofthe battery 996 and the voltage, the current, or the temperature of thecharging. The battery 996 can supply the power by generating theelectricity. For example, the battery 996 can be a rechargeable battery.

The indicator 997 displays a specific status of the hardware, forexample, booting state, message state, or charging state of the hardware900 or part (e.g., the AP 911) of the hardware 900.

The motor 998 converts the electric signal to a mechanic vibration. Aprocessor (e.g. AP 911) can control the sensor module 940.

The hardware 900 can include a processor (e.g., the GPU) for supportingmobile TV. For example, the processor for supporting the mobile TV canprocess media data in conformity with Digital Multimedia Broadcasting(DMB), Digital Video Broadcasting (DVB), or media flow standard. Theaforementioned components of the hardware can include one or more parts,and the name of the corresponding component can differ according to thetype of the electronic device. The hardware of the present invention caninclude at least one of the components, omit some components, or furtherinclude other components. Some of the hardware components can be unitedto a single entity to carry out the same functions of the correspondingcomponents.

The first electronic device 101 includes a memory for storing one ormore security environments, and one or more processors for obtainingwearing status information of the secondary electronic device 102 whichis wearable, determining a security environment of the first electronicdevice 101 based on the wearing status information.

When a user puts the secondary electronic device 102 on and then theuser is determined as a preset user according to the wearing statusinformation obtained, the processor may lower the security level of thesecurity environment.

When the secondary electronic device 102 is a watch type, the processordetects that the wearing status information uses a preset hole of thesecondary electronic device 102 when a user wears the secondaryelectronic device 102.

The processor determines the wearing status information using one ormore of a fingerprint sensor, an iris sensor, a pulse wave sensor, atemperature sensor, a grip sensor, and a tension sensor, which areconnected to the secondary electronic device 102.

The processor receives the wearing status information through one ormore network communications connecting the first electronic device 101and the secondary electronic device 102.

The processor periodically obtains the wearing status information whenthe first electronic device 101 and the secondary electronic device 102are connected.

The processor is able to limit a content range based on a security levelof the security environment by applying the security level to all orpart of the content of the first electronic device 101.

After determining the security environment, the processor is able todetect a change of the received wearing status information or theprocessor may receive no wearing status information. The processor isthen able to change the security environment of the first electronicdevice 101 in a preset manner and provide content corresponding to thechanged security environment.

After determining the security environment, when determining that therewas no change of the received wearing status information, the processormaintains the security environment of the electronic device.

The secondary electronic device 102 includes a memory for storing one ormore security environments, and one or more processors for determining awearing status of the secondary electronic device 102 using one or moresensors, determining a security level or a user profile corresponding tothe wearing status, and sending information of the security level or theuser profile to a first electronic device, The processor determineswearing status information of the secondary electronic device using oneor more of a fingerprint sensor, an iris sensor, a pulse wave sensor, atemperature sensor, a grip sensor, and a tension sensor of the secondaryelectronic device 102.

As set forth above, the security mode of the first electronic device 101is able to be controlled according to the wearing status of thesecondary electronic device 102 which is wearable and connected throughthe network communication, and a multi-security system can beestablished by concurrently using the security method with one or moresecondary electronic devices in addition to the present security methodapplied to the first electronic device 101.

Various embodiments for describing the present invention may beperformed by using one or more programs included in the memory 130 ofthe first electronic device 101, or may be directly controlled by aprocessor (e.g., the processor 120). In addition, the embodiments mayalso be controlled by using one or more control modules (e.g., thesecurity processing module 105). And the security processing module maybe controlled by the processor.

The term “module” used in various embodiments of the present inventioncan indicate, for example, a unit including a combination of one or moreof hardware, software, or firmware. The “module” can be interchangeablyused with the term, for example, a unit, logic, a logical block, acomponent, or a circuit. The “module” can be a minimum unit or part ofthe components integrally formed. The “module” may be a minimum unit orpart for one or more functions. The “module” can be implementedmechanically or electronically. For example, the “module” according tovarious embodiments of the present invention can include at least one ofan Application-Specific Integrated Circuit (ASIC) chip,Field-Programmable Gate Arrays (FPGAs), or a programmable-logic devicefor performing operations which are well known or to be invented.

According to various embodiments of the present invention, at least partof the device (e.g., modules or functions) or the method (e.g.,operations) according to various embodiments of the present inventioncan be implemented as, for example, an instruction stored in acomputer-readable storage media in the form of a programming module.When the instruction is executed by one or more processor (e.g., theprocessor 810), the one or more processors can perform a functioncorresponding to the instruction. The computer-readable storage mediumcan be, for example, the memory 860. At least part of the programmingmodule can be implemented by the processor 810. At least part of theprogramming module can include, for example, a module, a program, setsof instructions, or a process for performing one or more functions.

The programming module according to various embodiments of the presentinvention can include at least one of the aforementioned components,omit some components, or further include other components. Theoperations fulfilled by the programming modules or other componentsaccording to various embodiments of the present invention can be carriedout in sequence, in parallel, repeatedly, or heuristically. Also, someoperations can be executed in a different order or omitted, or otheroperations can be added.

The computer-readable recording medium can include magnetic media suchas hard disk, floppy disk and magnetic tape, optical media such asCompact Disc Read Only Memory (CD-ROM) and Digital Versatile Disc (DVD),magneto-optical media such as floptical disk, and hardware devicesspecifically configured to store and execute the application instruction(e.g., the programming module) such as Read Only Memory (ROM), RandomAccess Memory (RAM), and flash memory. Also, the application instructioncan include not only a machine code made by a complier but also ahigh-level language code executable by a computer using an interpreter.The above-stated hardware device can serve as one or more softwaremodules for fulfilling the operations of various embodiments of thepresent invention, and vice versa.

While the invention has been shown and described with reference tocertain embodiments thereof, it will be understood by those skilled inthe art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the invention as definedby the appended claims and their equivalents.

What is claimed is:
 1. A method of a first electronic device, the methodcomprising: obtaining, by a processor of the first electronic device,wearing status information of a second electronic device which iswearable; determining a security environment of the first electronicdevice, based on the wearing status information; after determining thesecurity environment, detecting a change of the obtained wearing statusinformation or obtaining an indication of no wearing status information;and changing the security environment of the first electronic device ina preset manner and providing a content corresponding to the changedsecurity environment, wherein, when a user puts the second electronicdevice on and the user is determined to be a preset user, according tothe obtained wearing status information, the first electronic devicelowers a security level of the security environment.
 2. The method ofclaim 1, wherein, when the second electronic device is a watch type, thewearing status information uses a preset hole of the second electronicdevice when the user wears the second electronic device.
 3. The methodof claim 1, wherein the wearing status information is determined usingat least one of a fingerprint sensor, an iris sensor, a pulse wavesensor, a temperature sensor, a grip sensor, and a tension sensor, whichare connected to the second electronic device.
 4. The method of claim 1,wherein the second electronic device is connected to the firstelectronic device through at least one network communication.
 5. Themethod of claim 1, wherein the wearing status information isperiodically obtained when the first electronic device and the secondelectronic device are connected.
 6. The method of claim 1, wherein thesecurity environment is a setting in a user profile determined based onthe wearing status information.
 7. The method of claim 1, wherein acontent range is limited based on a security level, according to thesecurity environment, by applying the security level to all or part of acontent of the first electronic device.
 8. The method of claim 1,further comprising: after determining the security environment, whendetermining no change of the obtained wearing status information,maintaining the security environment of the first electronic device. 9.A method of a second electronic device, the method comprising:detecting, by a processor of a first electronic device, a wearing statusof the second electronic device; confirming at least one of a securitylevel and a user profile corresponding to the wearing status; sendinginformation of the security level or the user profile to the firstelectronic device; after determining a security environment of the firstelectronic device, detecting a change of the obtained wearing statusinformation or obtaining an indication of no wearing status information;and changing the security environment of the first electronic device ina preset manner and providing a content corresponding to the changedsecurity environment, wherein, when a user puts the second electronicdevice on and the user is determined to be a preset user, according tothe detected wearing status, the first electronic device lowers asecurity level of the security environment.
 10. The method of claim 9,wherein the second electronic device comprises at least one of afingerprint sensor, an iris sensor, a pulse wave sensor, a temperaturesensor, a grip sensor, and a tension sensor, and determines wearingstatus information of the second electronic device using at least one ofthe sensors.
 11. A first electronic device, comprising: a memoryconfigured to store at least one security environment; at least oneprocessor configured to: obtain wearing status information of a secondelectronic device which is wearable, and determine a securityenvironment of the first electronic device, based on the wearing statusinformation, and when a user puts the second electronic device on andthe user is determined to be a preset user, according to the obtainedwearing status information, the first electronic device lowers asecurity level of the security environment, wherein, after determiningthe security environment, the at least one processor is configured todetect a change of the obtained wearing status information or obtain anindication of no wearing status information, and wherein the at leastone processor is configured to change the security environment of thefirst electronic device in a preset manner and provide a contentcorresponding to the changed security environment.
 12. The firstelectronic device of claim 11, wherein, when the second electronicdevice is a watch type, the processor is further configured to detectthat the wearing status information uses a preset hole of the secondelectronic device when the user wears the second electronic device. 13.The first electronic device of claim 11, wherein the processor isfurther configured to determine the wearing status information using atleast one of a fingerprint sensor, an iris sensor, a pulse wave sensor,a temperature sensor, a grip sensor, and a tension sensor, which areconnected to the second electronic device.
 14. The first electronicdevice of claim 11, wherein the processor is further configured toreceive the wearing status information through at least one networkcommunication connecting the first electronic device and the secondelectronic device.
 15. The first electronic device of claim 11, whereinthe processor is further configured to periodically obtain the wearingstatus information when the first electronic device and the secondelectronic device are connected.
 16. The first electronic device ofclaim 11, wherein the processor is further configured to limit a contentrange based on a security level according to the security environment byapplying the security level to all or part of a content of the firstelectronic device.
 17. The first electronic device of claim 11, wherein,after determining the security environment, when determining no changeof the obtained wearing status information, the processor is configuredto maintain the security environment of the electronic device.
 18. Asecond electronic device, comprising: a memory configured to store atleast one security environment; and at least one processor configured todetermine a wearing status of the second electronic device using atleast one sensor, determine at least one of a security level and a userprofile corresponding to the wearing status, and send information of thesecurity level or the user profile to a first electronic device,wherein, when a user puts the second electronic device on and the useris determined to be a preset user, according to the determined wearingstatus, the first electronic device lowers a security level of thesecurity environment, wherein, after determining the securityenvironment, the at least one processor is configured to detect a changeof the obtained wearing status information or obtain an indication of nowearing status information, and wherein the at least one processor isconfigured to change the security environment of the first electronicdevice in a preset manner and provide a content corresponding to thechanged security environment.
 19. The second electronic device of claim18, wherein the processor is further configured to determine wearingstatus information of the second electronic device using at least one ofa fingerprint sensor, an iris sensor, a pulse wave sensor, a temperaturesensor, a grip sensor, and a tension sensor of the second electronicdevice.