Method and device for providing a private page

ABSTRACT

Methods and devices for providing a private page are provided. A method includes operations of entering a security mode based on a user input; extracting the private page that corresponds to the security mode; and providing both the private page and a normal page that is provided during a normal mode, wherein the private page includes at least one object that is selected by a user so as to be provided during the security mode. A device includes a user input configured to receive a user input; a controller configured to enter a security mode based on the received user input, and extracting a private page that corresponds to the security mode; and a display configured to provide both the private page and a normal page that is provided during a normal mode, wherein the private page comprises at least one object that is selected by a user so as to be provided during the security mode.

CROSS REFERENCE TO RELATED APPLICATIONS

This Application is a Continuation Application of U.S. application Ser.No. 14/227,541 filed Mar. 27, 2014, which claims the benefit of U.S.Provisional Patent Application No. 61/805,632, filed on Mar. 27, 2013,in the U.S. Patent and Trademark Office, and priority from Korean PatentApplication No. 10-2013-0081785, filed on Jul. 11, 2013, in the KoreanIntellectual Property Office, the disclosures of which are incorporatedherein by reference, in their entireties.

BACKGROUND

1. Technical Field

Devices and methods consistent with the exemplary embodiments relate toa method and device for providing a private page that includes at leastone object and is displayed during a security mode, as well as a normalpage provided during a normal mode.

2. Description of the Related Art

Many users recently store and manage a plurality of pieces ofinformation in their portable terminals. The plurality of pieces ofinformation may have different security levels. For example, a securitylevel of a financial application, which includes financial information,may be a highest security level, whereas a security level of a searchapplication may have a relatively lower security level than the securitylevel of the finance application.

However, when a user lends the user's portable terminal to another user,all information in the portable terminal may be disclosed to the otheruser. In this regard, it is very inconvenient for the user to set apassword for each of the plurality of pieces of information.

Thus, there is a demand for a system that provides a storage space wherea plurality of pieces of information having high security levels areconveniently collected and which are not easily exposed to other users.

SUMMARY

One or more exemplary embodiments include a method and device forproviding a private page, so that applications, a plurality of pieces ofdata, notices, or the like, which are stored in the device, may beefficiently managed according to their security levels.

Additional aspects will be set forth in part in the description whichfollows and, in part, will be apparent from the description, or may belearned by practice of the exemplary embodiments.

According to one or more exemplary embodiments, a method of providing aprivate page includes operations of entering a security mode based on auser input; extracting the private page that corresponds to the securitymode; and providing both the private page and a normal page that isprovided during a normal mode, wherein the private page includes atleast one object that is selected by a user so as to be provided duringthe security mode.

The at least one object may be prevented from being provided during thenormal mode.

The at least one object includes at least one of an application, atleast one function provided by the application, and at least one contentprovided by the application.

The method may further include operations of receiving a user input ofmoving a first object included in the normal page to the private page;displaying the first object in the private page; and preventing thefirst object and information related to the first object from beingprovided during the normal mode.

The information related to the first object may include at least one ofan icon of the first object, installation information related to thefirst object, notice information related to the first object, and usehistory information related to the first object.

The operation of preventing may include operations of extracting asecond object related to the first object; and preventing the secondobject or information related to the second object from being providedduring the normal mode.

The operation of preventing may include an operation of displaying apredetermined indicator which indicates the private page on the privatepage.

The predetermined indicator may include at least one of a predeterminedcolor, a predetermined background image, a predetermined icon andpredetermined text.

The method may further include an operation of displaying an indicatoron the at least one object included in the private page, wherein theindicator corresponds to the private page.

The method may further include an operation of displaying an image whichcorresponds to the security mode on a status information window.

The method may further include operations of detecting an occurrence ofa notice event; determining a page that includes an object related tothe notice event; and providing notice information, based on a notifyingmethod that corresponds to the determined page.

The operation of providing the notice information may include operationsof detecting an occurrence of a notice event related to an objectincluded in the private page during the normal mode; and providingnotice information related to the object, based on a notifying methodthat corresponds to the private page.

The operation of entering may include an operation of receiving a seconduser input that is distinguished from a first user input of entering thenormal mode.

The security mode may include a plurality of security modes thatrespectively correspond to a plurality of user inputs.

The operation of entering may further include operations of entering afirst security mode, based on a first user input; and entering a secondsecurity mode, based on a second user input.

The operation of entering the security mode may include an operation ofdistinguishing between the first user input and the second user inputbased on at least one of pattern information, number information,information related to a user's gaze direction, information related to auser's face, fingerprint information, tilt information and motioninformation that is input to a lock screen.

According to one or more exemplary embodiments, a device includes a userinput configured to receive an input from a user; a controllerconfigured to enter a security mode based on the user input, and extracta private page that corresponds to the security mode; and a displayconfigured to provide both the private page and a normal page that isprovided during a normal mode, wherein the private page is configured toinclude at least one object that is selected by a user so as to beprovided during the security mode.

The controller may be configured to prevent the at least one object frombeing provided during the normal mode.

The at least one object may include at least one of an application, atleast one function provided by the application, and at least one contentprovided by the application.

The controller may be configured to extract a second object related tothe first object, and may prevent the second object or informationrelated to the second object from being provided during the normal mode.

The display may be configured to display a predetermined indicator whichis configured to indicate the private page on the private page.

The display may display an indicator on the at least one object includedin the private page, wherein the indicator corresponds to the privatepage.

The display may display an image which corresponds to the security modeon a status information window.

The controller may be configured to detect an occurrence of a noticeevent, may determine a page that includes an object related to thenotice event, and may provide notice information, based on a notifyingmethod that corresponds to the determined page.

The controller may be configured to detect an occurrence of a noticeevent related to an object included in the private page during thenormal mode, and may provide notice information related to the object,based on a notifying method that corresponds to the private page.

The user input may be configured to receive a second user input that isdistinguished from a first user input of entering the normal mode.

The controller may be configured to enter a first security mode, basedon a first user input, and may enter a second security mode, based on asecond user input.

The controller may be configured to distinguish between the first userinput and the second user input, based on at least one of patterninformation, number information, information related to a user's gazedirection, information related to a user's face, fingerprintinformation, tilt information, and motion information that are input toa lock screen, but is not limited thereto.

An aspect of an exemplary embodiment may provide a plural mode devicehaving a normal mode and at least one security mode, the deviceincluding: a user input configured to receive an input from a user toenter a normal mode or to enter one or more security modes; and acontroller configured to enter a user into a normal mode in response toan input for a normal mode being input by a user, and to enter a userinto a security mode in response to an input to enter a security modebeing input by the user, wherein in normal mode a user has access to oneor more normal pages and in security mode the user has access to the oneor more normal pages and one or more pages designated by the user asprivate pages.

The plural mode device may further include a display configured todisplay the one or more normal pages in normal mode and display both theone or more private pages and the one or more normal pages in securitymode.

The one or more private pages may include at least one object that isselected by a user so as to be provided during the security mode.

The controller may be configured to prevent private pages from beingdisplayed during normal mode.

The at least one object may include at least one of an application, atleast one function provided by the application, and at least one contentprovided by the application.

The user input may be configured to receive a user input to move a firstobject comprising a normal page to the one or more private pages.

BRIEF DESCRIPTION OF THE DRAWINGS

These and/or other aspects will become apparent and more readilyappreciated from the following description of the exemplary embodiments,taken in conjunction with the accompanying drawings in which:

FIG. 1 is a diagram which illustrates a private page according to anexemplary embodiment;

FIG. 2 is a flowchart of a method of creating a private page, accordingto an exemplary embodiment;

FIG. 3 illustrates an example of a graphical user interface (GUI) forcreating a private page, according to an exemplary embodiment;

FIGS. 4A and 4B illustrate an example of a private page, according to anexemplary embodiment;

FIG. 5 illustrates a GUI for adding a private page, according to anexemplary embodiment;

FIG. 6 illustrates an example in which at least one of objects includedin a normal page is moved to a private page, according to an exemplaryembodiment;

FIG. 7 illustrates an example in which at least one piece of data ismoved to a private page, according to an exemplary embodiment;

FIG. 8 is a flowchart of a method of providing a private page, accordingto an exemplary embodiment;

FIG. 9 is a diagram in which objects that are provided during each ofnormal and security modes are compared;

FIG. 10 illustrates an example in which a private page includes at leastone piece of data of an application, according to an exemplaryembodiment;

FIG. 11 illustrates an example in which a first object is moved to aprivate page and thus a second object related to the first object ismoved to the private page, according to an exemplary embodiment;

FIG. 12 illustrates a plurality of security modes according to anexemplary embodiment;

FIG. 13 illustrates private pages that respectively correspond to aplurality of security modes;

FIG. 14 is a flowchart of a method of providing notice informationrelated to an object included in a private page, according to anrespectively embodiment;

FIG. 15 illustrates notice levels according to an respectivelyembodiment;

FIG. 16 illustrates an example in which one or more objects included ina private page are moved to a normal page, according to an respectivelyembodiment; and

FIGS. 17 and 18 are block diagrams of devices according to respectivelyembodiments.

DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

All terms including descriptive or technical terms which are used hereinshould be construed as having meanings that are obvious to one ofordinary skill in the art. However, the terms may have differentmeanings according to an intention of one of ordinary skill in the art,precedent cases, or the appearance of new technologies. Also, some termsmay be arbitrarily selected by the applicant, and in this case, themeaning of the selected terms will be described in detail in thedetailed description. Thus, the terms used herein have to be definedbased on the meaning of the terms together with the descriptionthroughout the specification.

When a part “includes” or “comprises” an element, unless there is aparticular description contrary thereto, the part may further includeother elements, not excluding the other elements. In the followingdescription, terms such as “unit” and “module” indicate a unit forprocessing at least one function or operation, wherein the unit and theblock may be embodied as hardware or software or may be embodied bycombining hardware and software.

Reference will now be made in detail to exemplary embodiments, examplesof which are illustrated in the accompanying drawings, wherein likereference numerals refer to like elements throughout. In this regard,the exemplary embodiments may have different forms and should not beconstrued as being limited to the descriptions set forth herein.Accordingly, the exemplary embodiments are merely described below, byreferring to the figures, to explain aspects of the present description.As used herein, the term “and/or” includes any and all combinations ofone or more of the associated listed items. Expressions such as “atleast one of,” when preceding a list of elements, modify the entire listof elements and do not modify the individual elements of the list.

FIG. 1 is a diagram which illustrates a private page according to anexemplary embodiment.

A device 100 in an exemplary embodiment may provide a normal mode and asecurity mode, based on a type of user input.

In an exemplary embodiment, the normal mode indicates a basic mode setin the device 100. During the normal mode, the device 100 may provide anormal page 10 including one or more applications. The normal page 10may include a plurality of pages.

In an exemplary embodiment, the security mode indicates a mode duringwhich a private page that is not provided during the normal mode isadditionally provided. For example, the device 100 may further provide aprivate page 20 as well as the normal page 10 during the security mode.

The private page 20 may include at least one object that is selected bya user. Here, the at least one object included in the private page 20 isnot provided during the normal mode.

The at least one object included in the private page 20 may include atleast one of an application, at least one function from among functionsprovided by the application, and at least one piece of data (e.g.,content, use history, etc.) provided by the application, but one or moreexemplary embodiments are not limited thereto.

Throughout the specification, the term “application” means a group ofcomputer programs designed to perform a particular work. The applicationdescribed in the present application may vary. For example, theapplication may include, but is not limited to, a game application, avideo reproducing application, a map application, a memo application, abroadcasting application, an exercise support application, a paymentapplication and a photo editing application.

Throughout the specification, the term “content” means digitalinformation that is provided via a wired or wireless communicationnetwork. In one or more exemplary embodiments, the content may include,but is not limited to, moving picture content (e.g., a TV program image,video-on-demand (VOD), a personal image such as User-Created Contents(UCC), a music video, a YouTube video, etc.), still image content (e.g.,a photo, a picture, etc.), text content (e.g., an electronic book(poetry, novels, etc.), a letter, a work file, a web page, or the like),music content (e.g., music, radio broadcasting, or the like) and anapplication (a widget, a game, etc.).

The device 100 may enter the normal mode or the security mode, dependingon a type of user input. For example, in response to the device 100receiving a first user input (e.g., a normal code 11), the device 100may enter the normal mode, and in response to the device 100 receiving asecond user input (e.g., a security code 21), the device 100 may enterthe security mode.

In the present embodiment, the user input may include, but is notlimited to, at least one of a touch input, a bending input, a voiceinput, and a multimodal input.

Throughout the specification, the term “touch input” indicates a gestureof the user, which is performed on a touch screen so as to control thedevice 100. For example, the touch input may include a tap gesture, atouch & hold gesture, a double tap gesture, a drag gesture, a panninggesture, a flick gesture, a drag & drop gesture, or the like.

“Tapping” is a user's motion of touching a screen with a finger or atouch tool (e.g., a stylus pen) and then instantly lifting the finger ortouch tool from the screen. That is, in the tap gesture, a timedifference between a touch-in time at which the finger or touch tooltouches the screen and a touch-out time at which the finger or touchtool is lifted from the screen is very short.

“Touching & holding” is a user's motion of touching a screen with afinger or a touch tool (e.g., a stylus pen) and then maintaining thetouch motion over a critical period of time, after touching the screen.For example, a time difference between a touch-in time and a touch-outtime is greater than or equal to the critical period of time. Inresponse to a touch input lasting more than the critical time, in orderto inform the user whether the touch input is tapping or touching &holding, a feedback signal may be provided in a visual or acousticmanner.

“Double tapping” is a user's motion of rapidly touching the screen twicewith a finger or touch tool (such as a stylus pen).

“Dragging” is a user's motion of touching a screen with the finger ortouch tool and moving the finger or touch tool to another position onthe screen while touching the screen. The dragging motion may enable amoving or panning motion of an object.

“Panning” is a user's motion of performing a dragging motion withoutselecting an object. Since no object is selected in the panning motion,no object is moved in a page but the page itself is moved on the screenor a group of objects may be moved within a page.

“Flicking” is a user's motion of rapidly performing a dragging motionwith the finger or touch tool. The dragging (panning) motion or theflicking motion may be distinguished based on whether or not a movingspeed of the finger or touch tool is greater than a critical speed.

“Dragging & Dropping” is a user's motion of dragging an object to apredetermined position on the screen with the finger or touch tool andthen dropping the object at that position.

“Pinching” is a user's motion of moving two fingers touching the screenin opposite directions. The pinching motion is a gesture to magnify(open pinch) or contract (close pinch) an object or a page. Amagnification value or a contraction value is determined according tothe distance between the two fingers.

“Swiping” is a user's motion of touching an object on the screen withthe finger or touch tool and simultaneously moving the objecthorizontally or vertically by a predetermined distance. A swiping motionin a diagonal direction may not be recognized as a swiping event.

Throughout the specification, the term “motion input” indicates a motionthat a user does with the device 100 so as to control the device 100.For example, the motion input may include an input of the user whorotates the device 100, tilts the device 100, or moves the device 100 inup and down or right and left directions. The device 100 may sense amotion input that is preset by the user, by using an accelerationsensor, a tilt sensor, a gyro sensor, a 3-axis magnetic sensor, etc.

Throughout the specification, the term “bending input” indicates aninput of a user who bends a whole or partial area of the device 100 soas to control the device 100, and here, the device 100 may be a flexibledisplay device. In an exemplary embodiment, the device 100 may sense abending position (a coordinates value), a bending direction, a bendingangle, a bending speed, the number of times that the bending motion isperformed, a time of occurrence of the bending motion, a hold time ofthe bending motion, etc.

Throughout the specification, the term “multimodal input” indicates acombination of at least two input methods. For example, the device 100may receive a touch input and a motion input of the user, or may receivea touch input and a voice input of the user. Also, the device 100 mayreceive a touch input and an eye input of the user. The eye inputindicates an input by which the user adjusts a blink of an eye, a gazeposition, a moving speed of an eye, etc., so as to control device 100.

In an exemplary embodiment, the device 100 may be embodied in variousforms. For example, the device 100 may include, but is not limited to, amobile phone, a smartphone, a laptop computer, a tablet PC, anelectronic book terminal, a digital broadcast terminal, a personaldigital assistant (PDA), a portable multimedia player (PMP), anavigation device and an MP3 player.

Hereinafter, a method of creating the private page 20 that is providedduring the security mode, the method performed by the device 100, willnow be described with reference to FIGS. 2 through 4.

FIG. 2 is a flowchart of a method of creating a private page, accordingto an exemplary embodiment.

In operation S210, the device 100 may receive a request for creating aprivate page to be provided during a security mode. For example, inresponse to the device 100 operating in a normal mode, a user mayactivate a use of the security mode in a configuration setting, and mayselect a private page creation item. In response to the device 100operating in the security mode, the user may select a private pageaddition item.

In operation S220, the device 100 may receive an input of settinginformation regarding the security mode. For example, the device 100 mayreceive, from the user, information related to a user input (e.g., apassword, a touch pattern, etc.) for entering the security mode,identification (ID) information (e.g., an ID image, an ID icon, an IDcolor, etc.) for distinguishing between the security mode and othermodes, notifying method information related to an object included in thesecurity mode, etc. In other exemplary embodiments, the settinginformation related to the security mode may be expressed as settinginformation related to a private page.

In operation S230, the device 100 may create the private page to beprovided during the security mode, based on the setting information(e.g., the password for entering the security mode, the ID informationindicating the security mode, the notifying method information, etc.)related to the security mode. The device 100 may display the privatepage on a screen of the device 100.

According to an exemplary embodiment, the user may select at least oneobject from among objects included in the normal page, may move the atleast one selected object to the private page, and thus may prevent theat least the one selected object from being exposed during the normalmode.

Hereinafter, with reference to FIGS. 3 and 4, a process in which thedevice 100 creates the private page will now be described in detail.

FIG. 3 illustrates an example of a graphical user interface (GUI) forcreating a private page, according to an exemplary embodiment.

Referring to 310, the device 100 may display the GUI for setting asecurity mode on a screen of the device 100. The device 100 may switchan inactive state of the security mode into an active state. In thiscase, the device 100 may support not only a normal mode for providingnormal pages but may also additionally support the security mode inwhich a private page and a normal page are provided together.

Referring to 320, the device 100 may receive, from a user, a request tocreate a new private page. The device 100 may display, on the screen, aninput window for receiving an input of information (e.g., a password, aprivate page name, a private page color, an icon, a notice level, etc.)that is necessary in generating the private page.

Referring to 330, the device 100 may receive, from the user, an input ofa password for entering the security mode. The password may be variouslyconfigured. For example, the password may be configured by using atleast one of numbers, text, a touch pattern, a voice, bendinginformation, gaze information of the user, bio-information of the user,and motion information of the user. Hereinafter, for convenience ofdescription, it is assumed that the password is configured as a touchpattern.

Referring to 340, the device 100 may receive, from the user, an input ofsetting information related to the private page. For example, the usermay input ‘work’ as the private page name, may input ‘blue’ as theprivate page color to identify the private page, may select a lightingform as the icon to identify the private page, and may select ‘level 3’as the notice level related to an object included in the private page.The notice level means a level at which notice information is displayedwhen a notice event related to the object included in the private pageoccurs. The notice level will be described in detail with reference toFIG. 15.

FIGS. 4A and 4B illustrate an example of a private page, according to anexemplary embodiment.

As illustrated in FIG. 4A, the device 100 may create the private page tobe provided during a security mode, based on setting information inputby a user. The device 100 may provide information related to the totalnumber of security modes that are currently supported. For example, inresponse to one security mode being set, the device 100 may display acurrent security mode status 400 as ‘1.’

As illustrated in FIG. 4B, according to the setting information input bythe user, the device 100 may display the private page including an icon410 (e.g., a lighting form) which indicates the private page, a privatepage name 420 (e.g., a work), a color 430 (e.g., a blue color) foridentifying the private page, and a background image 440 for identifyingthe private page. Thus, the user may intuitionally recognize whether acurrent page is a normal page or a private page.

FIG. 5 illustrates a GUI for adding a private page, according to anexemplary embodiment.

As illustrated in FIG. 5, the device 100 may display the GUI for addingthe private page during a security mode. For example, the device 100 mayreceive a pinch input of a user with respect to a screen of the device100. Then, the device 100 may provide an editing mode by displaying allpages in a thumbnail form on the screen.

In response to the user selecting a page addition button 500, the device100 may provide a selection window for receiving an input of selecting atype of a page to be added. In response to the user selecting a normalpage 510 via the selection window, the device 100 may additionallycreate the normal page 510. However, in response to the user selecting aprivate page 520 via the selection window, the device 100 mayadditionally create the private page 520. The private page 520 mayinclude an icon, a color, a background image, a name, etc., that arepreviously set.

FIG. 6 illustrates an example in which at least one of objects includedin a normal page is moved to a private page, according to an exemplaryembodiment.

As illustrated in FIG. 6, the device 100 may move one or more objectsincluded in a normal page 610 to a private page 620, based on a userinput, and may display the one or more objects. For convenience ofdescription, it is assumed that the one or more objects areapplications.

A user may touch and drag a B application included in a page 1 of thenormal page 610 to the private page 620 while the user maintains thetouch. Also, the user may touch and drag G and H applications includedin a page 2 of the normal page 610 to the private page 620 while theuser maintains the touch. Here, the B, G, and H applications that aremoved to the private page 620 are prevented from being provided during anormal mode.

Thus, the user may move a finance-related application requiringsecurity, an account book application, a schedule management applicationrequiring privacy protection, an album application, etc. to the privatepage 620 so that they are provided only during a security mode.

Referring to FIG. 6, the one or more objects are moved by a touch anddrag input but one or more exemplary embodiments are not limitedthereto. For example, the user may move the one or more objects to theprivate page 620 by a long touch input by which an object is touchedover a predetermined period of time, or a double tap input.

FIG. 7 illustrates an example in which at least one piece of data ismoved to a private page, according to an exemplary embodiment.

According to an exemplary embodiment, the device 100 may move anapplication included in a normal page to the private page or may move atleast one piece of data included in the normal page to the private page.

Referring to 710, the device 100 may execute a phone number application.Then, the device 100 may receive, from a user, an input of selecting atleast one item of a phone number list.

For example, the user may want Tom's phone number to not be providedduring a normal mode but rather is provided via a private page during asecurity mode. Here, the user may touch an area of the phone number listin which Tom is displayed, over a predetermined period of time (e.g., 3seconds).

Referring to 720, in response to the device 100 receiving a user inputof touching a particular item (e.g., ‘Tom’) of the phone number listover the predetermined time (e.g., 3 seconds), the device 100 mayprovide an editing window for editing the particular item (e.g., ‘Tom’).For example, the user may revise information related to the particularitem (e.g., ‘Tom’) in the device 100 or may delete the informationrelated to the particular item (e.g., ‘Tom’), via the editing window.Also, the user may select ‘Hide’ and thus may move the particular item(e.g., ‘Tom’) and the information related to the particular item (e.g.,‘Tom’) to the private page.

Referring to 730, in response to the user attempting to move theparticular item (e.g., ‘Tom’) to the private page, the device 100 mayrequest the user to input a preset password that corresponds to asecurity mode. In response to the password being successfullyauthenticated, the device 100 may move the particular item (e.g., ‘Tom’)selected by the user, and the information related to the particular item(e.g., ‘Tom’) to the private page.

Although the exemplary embodiment shown in FIG. 7 is related to thephone number list, one or more exemplary embodiments are not limitedthereto. For example, the user may move at least one picture from aphoto album to the private page, or may move at least one item ofmusical content from a music folder to the private page.

Hereinafter, a method of providing a private page including at least oneuser-selected object, the method performed by the device 100, will nowbe described in detail with reference to FIG. 8.

FIG. 8 is a flowchart of a method of providing a private page, accordingto an embodiment of the present invention.

In operation S810, the device 100 may enter a security mode, based on auser input. For example, the device 100 may receive a second user inputthat is distinguished from a first user input of entering a normal mode.Here, the device 100 may distinguish between the first user input ofentering the normal mode and the second user input of entering thesecurity mode, based on at least one of pattern information, numberinformation, information related to a user's gaze direction, informationrelated to a user's face, fingerprint information, tilt information, andmotion information that are input to a lock screen.

For example, in response to a first touch pattern being input, thedevice 100 may enter the normal mode, and in response to a second touchpattern being input, the device 100 may enter the security mode. Also,in response to a user inputting a password while the user stares at acenter of the lock screen, the device may enter the normal mode, and inresponse to the user inputting the password while the user gazes at anupper portion of the lock screen, the device may enter the securitymode. In an exemplary embodiment, the device 100 may enter the normalmode in response to the password being input via a vertical screen mode,and the device 100 may enter the security mode when the password isinput via a horizontal screen mode. In an exemplary embodiment, thedevice 100 may enter the normal mode only in response to a touch patternbeing input, and the device 100 may enter the security mode in responseto the device 100 receiving a motion input of shaking the device 100over a predetermined number of times (e.g., 3 times) within apredetermined period of time (e.g., 3 sec.) after the touch pattern isinput. The first user input of entering the normal mode and the seconduser input of entering the security mode may be distinguished from eachother by using various methods.

In operation S820, the device 100 may extract the private page whichcorresponds to the security mode. For example, the device 100 mayextract a pre-created private page to be provided during the securitymode. In an exemplary embodiment, the device 100 may extract a pluralityof private pages that correspond to the security mode.

In operation S830, the device 100 may provide the extracted privatepage. The device 100 may provide a normal page and the private pageduring the security mode. For example, the private page may include atleast one object that is moved by the user from the normal page to theprivate page. Also, the private page may include an object that wasinstalled on the private page from the beginning, due to a user'ssetting.

In response to the user designating an application type (e.g., afinance-related application), the device 100 may automatically installon the private page an application (e.g., a bank application, aninsurance company application, a credit card company application, etc.)which corresponds to the application type.

The at least one object included in the private page may be preventedfrom being provided during the normal mode. For example, in response tothe device 100 entering the normal mode, the user cannot recognize theprivate page and the at least one object included in the private page.

Also, information related to the at least one object included in theprivate page may be prevented from being provided during the normalmode. For example, the information related to the at least one objectmay include, but is not limited to, at least one of an object icon,object installation information, object notice information, and objectuse history information.

The device 100 may extract a second object related to a first objectincluded in the private page, and may prevent the second object orinformation related to the second object from being provided during thenormal mode. The second object related to the first object will bedescribed in detail with reference to FIG. 11.

According to an exemplary embodiment, the object may include at leastone of an application, at least one function provided by theapplication, and at least one content provided by the application. Thatis, compared to the normal page, the private page may further include apredetermined application, a predetermined function of the predeterminedapplication, or a predetermined content provided by the predeterminedapplication. Thus, according to an exemplary embodiment, although thesame application is installed on both normal and private pages, afunction and data that are provided by the application may be differentin the normal page and the private page.

The device 100 may display a predetermined indicator which indicates theprivate page (or the security mode) on the private page. Thepredetermined indicator may include, but is not limited to, apredetermined color, a predetermined background image, a predeterminedicon, and a predetermined text. For example, referring back to FIG.4(b), the device 100 may display the private page name 420 (e.g.,“WORK”), the icon 410 (e.g., the lighting form) indicating the privatepage, the color 430 (e.g., the blue color) for identifying the privatepage, the background image 440 (e.g., a brick pattern), etc.

The device 100 may display the predetermined indicator which indicatesthe private page (or the security mode) on the at least one objectincluded in the private page. For example, in response to phone numbersof X, Y, and Z from among a phone number list may be checked only in theprivate page, the device 100 may display the predetermined indicator onitems of the phone numbers of X, Y, and Z. The predetermined indicatorwill be described in detail with reference to FIG. 13.

The device 100 may display an image which corresponds to the securitymode in a status information window. In response to the lighting formbeing selected as an icon for indicating the security mode, the device100 may display the lighting form in a status information windowdisplayed when the device 100 enters the security mode. Thus, byrecognizing the status information window, the user may rapidlyrecognize a mode of the device 100.

FIG. 9 is a diagram in which objects that are provided during each ofnormal and security modes are compared.

Referring to 910, the device 100 may receive a first user input (e.g., anormal code) via a locked screen. The device 100 may then enter a normalmode that corresponds to the first user input. The device 100 maydisplay normal pages during the normal mode. The normal pages mayinclude objects A, B, C, D, E, F, G, H.

Referring to 920, the device 100 may receive a second user input (e.g.,a security code #1) via the locked screen. The device 100 may then entera security mode that corresponds to the second user input. Also, thedevice 100 may additionally provide a private page as well as the normalpages during the security mode.

The device 100 may receive, from a user, an input of moving the B, G, Hobjects included in the normal pages to the private page. In this case,the device 100 may display the B, G, H objects in the private page andmay delete the B, G, H objects from the normal pages.

Referring to 930, the device 100 may receive the first user input (e.g.,the normal code) via the locked screen. The device 100 may then enterthe normal mode that corresponds to the first user input, and maydisplay the normal pages on a screen of the device 100. However, unlikethe normal pages shown in 910, the user cannot check the B, G, H objectsin the normal pages shown in 920. That is, in response to a particularobject being moved by the user to the private page during the securitymode, the particular object included in the private page is not providedduring the normal mode.

In response to the user moving the particular object to the private pageduring the security mode, the device 100 may not provide informationrelated to the particular object during the normal mode. For example, inresponse to the user moving a Chrome browser to the private page, asearch history of searches via the Chrome browser, bookmarks related tothe Chrome browser, etc., as well as the Chrome browser, may be moved tothe private page. Thus, the device 100 may not provide the Chromebrowser, the search history, information about the bookmarks, etc.,during the normal mode. Although the Chrome browser may be installedagain in the normal page at a later time, the search history,information regarding the bookmarks, etc., that are of the Chromebrowser and were moved to the private page are not provided during thenormal mode.

According to an exemplary embodiment, in response to the device 100being connected to an external device (e.g., a PC) during the normalmode, the device 100 may not transmit information related to the B, G, Hobjects to the external device. On the other hand, in response to thedevice 100 being connected to the external device (e.g., the PC) duringthe security mode, the device 100 may transmit the information relatedto the B, G, H objects to the external device.

FIG. 10 illustrates an example in which a private page includes at leastone piece of data of an application, according to an exemplaryembodiment.

Referring to 1010, the device 100 may receive a first user input (e.g.,a normal code) via a locked screen. The device 100 may then enter anormal mode that corresponds to the first user input. During the normalmode, the device 100 may execute a phonebook application included in anormal page. A phone number list may include phone numbers of John,Mary, Tom, Danny, Kathy, etc.

Referring to 1020, the device 100 may receive a second user input (e.g.,a security code #1), via the locked screen. The device 100 may thenenter a security mode that corresponds to the second user input. Also,the device 100 may additionally provide a private page as well as thenormal page during the security mode.

The device 100 may receive an input of moving Danny and Kathy from thephone number list to the private page. In this case, the device 100 maycopy the phonebook application, including Danny and Kathy, to theprivate page, and may delete Danny and Kathy from the phonebookapplication in the normal page.

Referring to 1030, the device 100 may receive the first user input(e.g., the normal code) via the locked screen. The device 100 may thenenter the normal mode that corresponds to the first user input, and maydisplay the normal page, including the phonebook application, on ascreen of the device 100. In response to the phonebook application beingexecuted, unlike the phone number list shown in 1010, the phone numberlist shown in 1030 may not include Danny and Kathy. That is, in responseto a user moving particular data or a particular item to the privatepage during the security mode, the particular data or the particularitem included in the private page is not provided during the normalmode.

In response to the user moving the particular data or the particularitem to the private page during the security mode, the device 100 maynot provide information related to the particular data or the particularitem during the normal mode. For example, in response to the userselecting Danny and Kathy in the phone number list and moving them tothe private page, the device 100 may not provide call histories, textmessage exchange histories, etc. of Danny and Kathy during the normalmode.

FIG. 11 illustrates an example in which a first object is moved to aprivate page and thus, a second object related to the first object ismoved to the private page, according to an exemplary embodiment.

Referring to 100-1, the device 100 may execute a phonebook applicationduring a security mode and may display a phone number list on a screenof the device 100. A user may select, from the phone number list, phonenumbers that the user wants to only provide in a security mode. Forexample, the user may select Danny and Kathy, and may move Danny andKathy to the private page. In this case, a first user group (e.g., John,Mary, Tom) 1110 may be provided during both normal and security modes.However, a second user group (e.g., Danny and Kathy) 1120 may not beprovided during the normal mode and may be provided only during thesecurity mode.

Referring to 1100-2, the device 100 may distinguish between a pluralityof image contents 1111 which correspond to the first user group (e.g.,John, Mary, Tom) 1110 and a plurality of image contents 1121 whichcorrespond to the second user group (e.g., Danny and Kathy) 1120 that ismoved to the private page. The device 100 may not provide the imagecontents 1121 which correspond to the second user group (e.g., Danny andKathy) 1120 that is moved to the private page during the normal mode andmay provide the image contents 1121 only during the security mode.

FIG. 12 illustrates a plurality of security modes according to anexemplary embodiment.

The device 100 may provide a plurality of security modes. The pluralityof security modes may be respectively mapped with particular userinputs. For example, a first security mode may be mapped with a firstuser input (e.g., a first touch pattern), and a second security mode maybe mapped with a second user input (e.g., a second touch pattern).

In a case where the device 100 receives the first user input (e.g., thefirst touch pattern) via a locked screen, the device 100 may enter afirst security mode. The device 100 may then provide a private pagewhich corresponds to the first security mode, as well as providing anormal page. For example, the device 100 may provide the normal pageincluding a basic application App 0, a basic log Log 0, a basic noticeNotice 1, and basic data Data 0, and the private page including a firstapplication App 1, a first log Log 1, a first notice Notice 1, and firstdata Data 1.

According to an exemplary embodiment, in response to the device 1000receiving the second user input (e.g., the second touch pattern) via thelocked screen, the device 100 may enter the second security mode. Thedevice 100 may then provide a private page which corresponds to thesecond security mode, as well as the normal page. For example, thedevice 100 may provide the normal page including the basic applicationApp 0, the basic log Log 0, the basic notice Notice 0, and the basicdata Data 0, and the private page including a second application App 2,a second log Log 2, a second notice Notice 2, and second data Data 2.The plurality of security modes are described in detail with referenceto FIG. 13.

FIG. 13 illustrates private pages that respectively correspond to aplurality of security modes.

Referring to 1300-1, the device 100 may receive a first user input(e.g., a normal code) via a locked screen. The device 100 may enter anormal mode, based on the first user input (e.g., the normal code). Inthis case, the device 100 may display a normal page on a screen of thedevice 100. Also, the device 100 may not display a separate indicator onthe normal page and a status information window during the normal mode.

Referring to 1300-2, the device 100 may receive a second user input(e.g., a security code #1) via the locked screen. The device 100 mayenter a first security mode, based on the second user input (e.g., thesecurity code #1). In this case, the device 100 may display a firstprivate page which corresponds to the first security mode. Also, thedevice 100 may display a first indicator on the first private page orthe status information window. The first indicator may include, but isnot limited to, an icon (e.g. a smile icon), a text (e.g., S1), a color(e.g., a blue color), or a background image (e.g., a flower image) thatare for identifying the first security mode (or the first private page).

In response to a smile icon 1310 being pre-selected as the icon foridentifying the first security mode, the device 100 may display thesmile icon 1310 on an area (e.g., an upper left area) of the firstprivate page. The device 100 may also display the smile icon 1310 onDanny and Kathy in a phone number list which is set to be provided onlyin the first security mode. In order to notify the user that a currentmode is the first security mode, the device 100 may display the smileicon 1310 on the status information window.

Referring to 1300-3, the device 100 may receive a third user input(e.g., a security code #2) via the locked screen. The device 100 mayenter a second security mode, based on the third user input (e.g., thesecurity code #2). In this case, the device 100 may display a secondprivate page which corresponds to the second security mode. Also, thedevice 100 may display a second indicator on the second private page orthe status information window. The second indicator may include, but isnot limited to, an icon (e.g. a star icon), a text (e.g., S2), a color(e.g., a green color), or a background image (e.g., a water drop image)that are for identifying the second security mode (or the second privatepage).

In response to a star icon 1320 being pre-selected as the icon foridentifying the second security mode, the device 100 may display thestar icon 1320 on an area (e.g., an upper left area) of the secondprivate page. Also, the device 100 may display the star icon 1320 onMary in a phone number list which is set to be provided only in thesecond security mode. In order to notify the user that a current mode isthe second security mode, the device 100 may display the star icon 1320on the status information window.

Hereinafter, a method of the device 100 providing notice information, inresponse to a notice event related to an object included in a privatepage occurring during a normal mode status or a locked screen status,will now be described in detail with reference to FIG. 14.

FIG. 14 is a flowchart of a method of providing notice informationrelated to an object included in a private page, according to anexemplary embodiment.

In operation S1410, the device 100 may detect an occurrence of a noticeevent. For example, the device 100 may receive a push notice messagerelated to at least one application. Alternatively, a preset noticesituation may occur in the device 100.

In operation S1420, the device 100 may determine a page that includes anobject related to the notice event. The object may include, but is notlimited to, an application, at least one function of the application, orat least one piece of data or an item which is provided by theapplication.

In response to the notice event related to a first applicationoccurring, the device 100 may determine whether the first application isincluded in a normal page or a private page. In addition, the device 100may determine whether the first application is included in a firstprivate page which corresponds to a first security mode or a secondprivate page which corresponds to a second security mode.

In operation S1430, the device 100 may provide the notice information,based on a notifying method that corresponds to the determined page. Forexample, in response to a push notice message related to an objectincluded in the normal page being received, the device 100 may displayall contents of the push notice message on a locked screen. In responseto a push notice message related to an object included in the privatepage being received, the device 100 may display, on a status informationwindow, an icon that corresponds to the private page, and thus maynotify the user that the push notice message is received. The notifyingmethod is now described in detail with reference to FIG. 15.

FIG. 15 illustrates notice levels according to an exemplary embodiment.

Referring to 1510, a user may select a first notice level as a noticelevel that corresponds to a private page (or a security mode). Inresponse to a notice event related to an object included in the privatepage occurring, the device 100 may display notice information at anotice level equal to a normal mode. For example, the device 100 maydisplay all contents of a notice message or may apparently display anotice window indicating that the notice message is received. Here, thedevice 100 may display an indicator (e.g., a smile icon) correspondingto the private page (or the security mode) on the notice message or thenotice window, so that a user may intuitively recognize in which pagethe object related to the occurrence of the notice event is located.

According to an exemplary embodiment, in response to the device 100providing the notice information related to the object included in theprivate page during the normal mode status or the locked screen status,the existence of the private page may be externally disclosed, and inthis regard, the user may increase a security level of the noticeinformation and thus may prevent the existence of the private page frombeing externally disclosed.

For example, referring to 1520, the user may select a second noticelevel as the notice level that corresponds to the private page (or thesecurity mode). In this case, in response to the notice event related tothe object included in the private page occurring, the device 100 maydisplay the indicator (e.g., the smile icon) which corresponds to theprivate page (or the security mode) on a status information window.

Referring to 1530, the user may select a third notice level as thenotice level that corresponds to the private page (or the securitymode). In this case, in response to the notice event related to theobject included in the private page occurring, the device 100 maydisplay a preset fake image on the lock screen. For example, in responseto the notice event related to the object included in the private pageoccurring, the device 100 may display a weather widget on the lockscreen so as to induce the user to enter the security mode and to checkthe private page.

Referring to 1540, the user may select a fourth notice level as thenotice level that corresponds to the private page (or the securitymode). In this case, in response to the notice event related to theobject included in the private page occurring, the device 100 may notdisplay the notice information on the locked screen. However, inresponse to the device 100 receiving a security input (e.g., a touchinput over a predetermined time, a shaking input over a predeterminednumber of times, etc.) which was preset by the user, the device 100 maydisplay the notice information related to the object included in theprivate page on the screen.

The exemplary embodiment of FIG. 15 includes the first through fourthnotice levels, but one or more exemplary embodiments are not limitedthereto. The notice level may be departmentalized in other exemplaryembodiments.

FIG. 16 illustrates an example in which one or more objects included ina private page are moved to a normal page, according to an exemplaryembodiment.

Referring to 1610, a user may touch and drag a B application included ina first normal page to a first private page which corresponds to a firstsecurity mode while the user maintains the touch. Also, the user maytouch and drag G and H applications included in a second normal page tothe first private page corresponding to the first security mode whilethe user maintains the touch. Here, the B, G, and H applications thatare moved to the first private page are prevented from being providedduring a normal mode.

Referring to 1620, in response to the user touching an object (e.g., theB application) included in the first private page over a predeterminedperiod of time, the device 100 may display a movement window 1600 wherethe user may move the object (e.g., the B application) included in thefirst private page to the normal page or a private page of anothersecurity mode (e.g., a second security mode or a third security mode).In response to the user selecting ‘unhide’ from the movement window1600, the device 100 may move the B application to the normal page.

In response to the user selecting the second security mode from themovement window 1600, the device 100 may request an input of a secondsecurity code that corresponds to the second security mode. In responseto the device 100 receiving an input of the second security code fromthe user, the device 100 may move the object (e.g., the B application)included in the first private page to a second private page thatcorresponds to the second security mode.

Referring to 1630, the user may touch and drag the B applicationincluded in the first private page to the first normal page while theuser maintains the touch. In this case, the device 100 may remove the Bapplication from the first private page, and may display the Bapplication on the first normal page. Also, the device 100 may providethe B application and information related to the B application duringthe normal mode.

FIGS. 17 and 18 are block diagrams devices 100 according to exemplaryembodiments.

As illustrated in FIG. 17, the device 100 may include a user input 110,a display 121, and a controller 130 (also, referred as a processor 130).However, not all shown elements are necessary elements. That is, thedevice 100 may be embodied with more or less elements than the shownelements.

For example, as illustrated in FIG. 18, the device 100 may furtherinclude a sensing device 140, a communicator 150, an audio/video (A/V)input 160, and a memory 170, as well as the user input 110, the output120, and the processor 130.

Hereinafter, the elements are described below.

The user input 110 may be an input by which a user inputs data so as tocontrol the device 100. For example, the user input 110 may include akey pad, a dome switch, a touch pad (a touch capacitive type touch pad,a pressure resistive type touch pad, an infrared beam sensing type touchpad, a surface acoustic wave type touch pad, an integral strain gaugetype touch pad, a piezo effect type touch pad, or the like), a jogwheel, and a jog switch, but one or more exemplary embodiments are notlimited thereto.

The user input 110 may receive a user input of entering each mode. Forexample, the user input 110 may receive a first user input to enter anormal mode, and may receive a second user input to enter a securitymode. In a case of a plurality of security modes, the user input 110 mayreceive user inputs that respectively correspond to the plurality ofsecurity modes.

The user input 110 may receive a user input of moving an object includedin a normal page to a private page. The user input 110 may receive auser input of moving an object included in the private page to thenormal page.

An output 120 may function to output an audio signal, a video signal, ora vibration signal and may include a display 121, a sound output 122, avibration motor 123, or the like.

The display 121 displays and outputs information that is processed inthe device 100. During a call mode, the display 121 may display a userinterface (UI) or GUI that is related to a phone call, and during thesecurity mode, the display 121 may further display the private page aswell as the normal page that is provided during the normal mode. Theprivate page may include at least one object that is selected by theuser so as to be provided during the security mode.

The display 121 may display a predetermined indicator which indicatesthe private page on the private page. The predetermined indicator mayinclude at least one of a predetermined color, a predeterminedbackground image, a predetermined icon, and a predetermined text. Also,the display 121 may display an indicator, which corresponds to theprivate page (or the security mode), on the at least one object includedin the private page. The display 121 may display, on a statusinformation window, an image that corresponds to the private page (orthe security mode).

In response to the display 121 and a touch pad forming a mutual layerstructure and then formed as a touch screen, the display 121 may be usedas both an output device and input device, e.g., an I/O. The display 121may include at least one of a liquid crystal display (LCD), a thin filmtransistor-liquid crystal display (TFT-LCD), an organic light-emittingdiode display, a flexible display, a 3D display, and an electrophoreticdisplay. Also, according to a type of the device 100, the device 100 mayinclude at least two displays 121. The at least two displays 121 mayface each other through the use of a hinge.

The sound output 122 may output audio data that is received from thecommunicator 150 or is stored in the memory 170. The sound output 122may also output a sound signal (e.g., a call signal receiving sound, amessage receiving sound, or the like) related to capabilities performedby the device 100. The sound output 122 may include a speaker, a buzzer,or the like.

The vibration motor 123 may output a vibration signal. For example, thevibration motor 123 may output the vibration signal that corresponds toan output of the audio data (e.g., the call signal receiving sound, themessage receiving sound, or the like) or video data. In response to atouch being input to the touch screen, the vibration motor 123 mayoutput a vibration signal.

The controller 130 may generally control all operations of the device100. That is, the controller 130 may control the user input 110, theoutput 120, the sensing device 140, the communicator 150, the A/V input160, the memory 170, etc. by executing programs stored in the memory170.

The controller 130 may enter the security mode based on a user input,and may extract the private page that corresponds to the security mode.For example, the controller 130 may enter a first security mode based ona first user input, and may enter a second security mode based on asecond user input.

The controller 130 may distinguish between the first user input and thesecond user input, based on at least one of pattern information, numberinformation, information about a user's gaze direction, informationabout a user's face, fingerprint information, tilt information, andmotion information that are input to a locked screen.

The controller 130 may prevent the at least one object, which isincluded in the private page, from being provided during the normalmode. For example, the controller 130 may prevent a first objectincluded in the private page and information related to the first objectfrom being provided during the normal mode. The information related tothe first object may include, but is not limited to, at least one of anicon of the first object, installation information related to the firstobject, notice information related to the first object, and usagehistory information related to the first object.

The controller 130 may extract a second object related to the firstobject that was moved to the private page, and may prevent the secondobject or information related to the second object from being providedduring the normal mode.

The controller 130 may extract an occurrence of a notice event. Forexample, the controller 130 may determine a page that includes an objectrelated to the notice event, and may provide notice information, basedon a notifying method that corresponds to the determined page.

The sensor 140 may sense a status of the device 100 or a status aroundthe device 100, and may deliver information related to the sensed statusto the controller 130.

The sensor 140 may include at least one of a magnetic sensor 141, anacceleration sensor 142, a temperature/humidity sensor 143, an infraredsensor 144, a gyroscope sensor 145, a position sensor (e.g., GPS) 146,an air pressure sensor 147, a proximity sensor 148, and an RGB sensor(i.e., a luminance sensor) 149, but one or more exemplary embodimentsare not limited thereto. Functions of the sensors may be intuitionallydeduced by one of ordinary skill in the art by referring to names of thesensors, thus, detailed descriptions thereof are omitted herein.

The communicator 150 may include one or more elements allowingcommunication between the device 100 and an external device or betweenthe device 100 and a server (not shown). For example, the communicator150 may include a short range communication unit 151, a mobilecommunication unit 152, and a broadcast receiver 153.

The short range communicator 151 may include, but is not limitedthereto, a Bluetooth® communication unit, a BLE communication unit, anNFC/RFID unit, a Wi-Fi communication unit, a ZigBee® communication unit,an IrDA communication unit, a WFD communication unit, a UWBcommunication unit, an Ant+ communication unit, or the like.

The mobile communicator 152 exchanges a wireless signal with at leastone of a base station, an external terminal, and a server on a mobilecommunication network. The wireless signal may include various types ofdata according to communication of a sound call signal, a video callsignal, or a text/multimedia message.

The broadcast receiver 153 receives a broadcast signal and/orinformation related to broadcast from the outside through a broadcastchannel. The broadcast channel may include a satellite channel and aground wave channel. According to an exemplary embodiment, the firstdevice 100 may not include the broadcast receiver 153.

The A/V input 160 may receive an input of an audio signal or a videosignal and may include a camera 161 and a microphone 162. The camera 161may obtain an image frame such as a still image or a video via an imagesensor during a video call mode or an image-capturing mode. An imagethat is captured via the image sensor may be processed by the controller130 or a separate image processing unit (not shown).

The image frame that is processed by the camera 161 may be stored in thememory 170 or may be transmitted to an external source via thecommunicator 150. According to a configuration of the device 100, two ormore cameras 161 may be arranged.

The microphone 162 receives an external sound signal as an input andprocesses the received sound signal into electrical voice data. Forexample, the microphone 162 may receive a sound signal from an externaldevice or a speaker. In order to remove noise that occurs while thesound signal is externally input, the microphone 162 may use variousnoise removing algorithms.

The memory 170 may store a program for processing and controlling thecontroller 130, or may store a plurality of pieces of input/output data(e.g., a user input that corresponds to the security mode, apredetermined indicator that corresponds to the security mode or theprivate page, a notifying method that corresponds to the security mode,etc.).

The memory 170 may include a storage medium of at least one type of aflash memory, a hard disk, a multimedia card type memory, a card typememory such as an SD or XD card memory, RAM, SRAM, ROM, EEPROM, PROM, amagnetic memory, a magnetic disc, and an optical disc. Also, the device100 may run web storage or a cloud server that performs a storagefunction of the memory 170, on the Internet.

The programs stored in the memory 170 may be classified into a pluralityof modules according to their functions, for example, into a UI module171, a touch screen module 172, etc.

The UI module 171 may provide a specialized UI or GUI in connection withthe device 100 for each application. The touch screen module 172 maydetect a user's touch gesture on the touch screen and transmitinformation related to the touch gesture to the controller 130. Thetouch screen module 172 may recognize and analyze a touch code. Thetouch screen module 172 may be configured by additional hardwareincluding a controller.

Various sensors may be arranged in or near the touch screen so as todetect a touch or a proximate touch on the touch sensor. An example ofthe sensor to detect the touch on the touch screen may include a tactilesensor. The tactile sensor detects a contact of a specific object by atleast as much as a person can detect. The tactile sensor may detectvarious types of information such as the roughness of a contact surface,the hardness of the contact object, the temperature of a contact point,or the like.

An example of the sensor to detect the touch on the touch screen mayinclude a proximity sensor.

The proximity sensor detects the existence of an object that approachesa predetermined detection surface or that exists nearby, by using aforce of an electro-magnetic field or an infrared ray, instead of amechanical contact. Examples of the proximity sensor include atransmission-type photoelectric sensor, a direction reflection-typephotoelectric sensor, a mirror reflection-type photoelectric sensor, ahigh frequency oscillation-type proximity sensor, a capacity-typeproximity sensor, a magnetic proximity sensor, an infrared-typeproximity sensor, or the like. The touch gesture (i.e., an input) of theuser may include a tap gesture, a touch & hold gesture, a double tapgesture, a drag gesture, a panning gesture, a flick gesture, a drag &drop gesture, a swipe gesture, or the like.

One or more exemplary embodiments may also be embodied as programmedcommands to be executed in various computer means, and then may berecorded in a non-transitory computer-readable recording medium. Thecomputer-readable recording medium may include one or more of theprogrammed commands, data files, data structures, or the like. Theprogrammed commands recorded to the computer-readable recording mediummay be particularly designed or configured for one or more exemplaryembodiments or may be well known to one of ordinary skill in the art.Examples of the computer-readable recording medium include magneticmedia including hard disks, magnetic tapes, and floppy disks, opticalmedia including CD-ROMs and DVDs, magneto-optical media includingfloptical disks, and hardware designed to store and execute theprogrammed commands in ROM, RAM, a flash memory, and the like. Examplesof the programmed commands include not only machine code generated by acompiler but also include a high-level programming language to beexecuted in a computer by using an interpreter.

According to the exemplary embodiments, the device 100 may provide aprivate page in which objects that a user does not want to externallydisclose are collected.

It should be understood that the exemplary embodiments described thereinshould be considered in a descriptive sense only and not for purposes oflimitation. Descriptions of features or aspects within each exemplaryembodiment should typically be considered as available for other similarfeatures or aspects in other exemplary embodiments.

While one or more exemplary embodiments of the present invention havebeen described with reference to the figures, it will be understood bythose of ordinary skill in the art that various changes in form anddetails may be made therein without departing from the spirit and scopeof the present invention as defined by the following claims.

What is claimed is:
 1. A method of providing notice information, themethod comprising: detecting an occurrence of a notice event;determining a page that comprises an object related to the notice event,providing notice information, based on a notifying method thatcorresponds to the determined page.
 2. The method of claim 1, whereinthe providing of the notice information comprises displaying the noticeinformation on a locked screen based on the notifying method thatcorresponds to the determined page.
 3. The method of claim 2, furthercomprising unlocking the locked screen, wherein the unlocking the lockedscreen comprises: entering the normal mode based on a first user inputon the locked screen or entering the security mode based on a seconduser input on the locked screen, the second user input beingdistinguished from the first user input to enter the normal mode.
 4. Themethod of claim 3, wherein the unlocking the locked screen comprisesdistinguishing between the first user input and the second user input,based on at least one of pattern information, number information,information related to a user's gaze direction, information related to auser's face, fingerprint information, tilt information, and motioninformation that are input to the locked screen.
 5. The method of claim1, wherein the providing of the notice information comprises: when theoccurrence of the notice event related to the object comprised in theprivate page is detected, determining whether during the security modeor the normal mode; and providing the notice information based on thenotifying method that corresponds to the determined mode.
 6. The methodof claim 1, wherein the page comprises a private page or a normal page,the private page comprising at least one object that is selected by auser so as to be provided during a security mode, and the normal pagecomprising at least one object that is selected by the user so as to beprovided during a normal mode and the security mode.
 7. The method ofclaim 6, wherein the normal mode provides the normal page without theprivate page and the security mode provides both the private page andthe normal page.
 8. The method of claim 1, wherein the object comprisesat least one of an application, at least one function provided by theapplication, and at least one content provided by the application.
 9. Adevice comprising: a display configured to provide at least one page;and a controller configured to: detect an occurrence of a notice event,determine a page that comprises an object related to the notice event,and provide notice information, based on a notifying method thatcorresponds to the determined page.
 10. The device of claim 9, whereinthe controller is configured to display the notice information on alocked screen based on the notifying method that corresponds to thedetermined page.
 11. The device of claim 10, wherein the controller isfurther configured to enter the normal mode based on a first user inputon the locked screen or enter the security mode based on a second userinput on the locked screen, the second user input being distinguishedfrom the first user input to enter the normal mode.
 12. The device ofclaim 11, wherein the controller is further configured to distinguishbetween the first user input and the second user input, based on atleast one of pattern information, number information, informationrelated to a user's gaze direction, information related to a user'sface, fingerprint information, tilt information, and motion informationthat are input to the locked screen.
 13. The device of claim 9, whereinthe controller is configured to, when the occurrence of the notice eventrelated to the object comprised in the private page is detected,determine whether during the security mode or the normal mode, andprovide the notice information based on the notifying method thatcorresponds to the determined mode.
 14. The device of claim 9, whereinthe page comprises a private page or a normal page, the private pagecomprising at least one object that is selected by a user so as to beprovided during a security mode, and the normal page comprising at leastone object that is selected by the user so as to be provided during anormal mode and the security mode.
 15. The device of claim 14, whereinthe normal mode provides the normal page without the private page andthe security mode provides both the private page and the normal page.16. The device of claim 9, wherein the object comprises at least one ofan application, at least one function provided by the application, andat least one content provided by the application.
 17. A non-transitorycomputer-readable recording medium having recorded thereon a program,wherein the program, when executed by a processor of a computer, causesthe computer to execute the method of claim 1.