![]() MOBILE TERMINAL AND METHOD OF CONTROLLING THE SAME
专利摘要:
The present invention relates to a mobile terminal (100) comprising a camera (121) provided in the body of the terminal; a touch screen (151) adapted to display a preview received through the camera; and a controller (180) configured to perform an authentication process associated with an object (310) in the preview and to obtain secure information for operating the object in the preview, and for editing the information secure once the authentication process has been successfully executed based on the authentication information entered. 公开号:FR3039294A1 申请号:FR1655791 申请日:2016-06-22 公开日:2017-01-27 发明作者:Eunsoo Jung;Minjoo Kim;Euitaek Oh;Sunhee Kim 申请人:LG Electronics Inc; IPC主号:
专利说明:
MOBILE TERMINAL AND METHOD OF CONTROLLING THE SAME The present invention relates to a mobile terminal and its control method. The terminals can be divided into mobile or portable terminals and fixed terminals. In addition, the mobile terminals can be classified into portable terminals and on-board terminals, depending on whether or not a user can directly carry the terminal. Having become multifunctional, a mobile terminal can capture still images or moving images, play music or video files, play games, receive broadcasts and the like, so as to be implemented as an integrated media player. Significant efforts are being made not only to modify and improve the structural components that constitute a mobile terminal, but also to improve the software to support and improve the terminal functions. In addition, domestic electronic devices or websites require more and more often security information or personal data. In addition, a terminal may store information relating to the privacy of a person, such as personal data, security information and the like. The loss of the terminal increases the risk of exposing privacy information to an undesirable third party. Therefore, one aspect of the detailed description is the provision of a mobile terminal and the corresponding method for providing security information or personal data to a user, if necessary, although the user does not remember the information security or personal data in question. Another aspect of the detailed description is the provision of a mobile terminal and the corresponding method for enhancing security. In more detail, one aspect of the detailed description is the provision of a mobile terminal and the corresponding method allowing only an authorized user to access specific information or a specific function. Yet another aspect of the detailed description is the provision of a mobile terminal and the corresponding method for providing a graphical user interface (GUI) allowing a user to access information or a secure function more intuitively and more intuitively. convenient. To achieve these and other advantages, and in accordance with the objectives of this Memoir as implemented and described generally herein, the present invention provides, in a first aspect, a mobile terminal comprising a camera provided in the present invention. terminal body; a touch screen designed to display a preview received through the camera; and a controller configured to perform an authentication process associated with an object in the preview and to obtain secure information for operating the object in the preview, and to edit secure information once the process is complete. authentication has been successfully executed based on the authentication information entered. Another aspect of the present invention provides a method of controlling a mobile terminal, the method comprising editing, via the touch screen of the mobile terminal, an overview received through the camera of the mobile terminal; executing, via the mobile terminal controller, an authentication process associated with an object in the preview and obtaining secure information for operating the object in the preview; and issuing secure information via the controller when the authentication process has been successfully executed based on the authentication information entered. Other fields of application of the present invention will become more apparent upon reading the detailed description provided hereinafter. However, it should be pointed out that the detailed description and the specific examples, although indicating preferred embodiments of the invention, are provided for purely illustrative purposes since, as will be understood by those skilled in the art upon reading the Detailed description, it is possible to consider various variants and modifications thereof while remaining within the spirit and scope of the invention. The accompanying drawings, which have been included to provide a better understanding of the invention and form an integral part of this Memo, illustrate representative embodiments and serve, together with the description, to explain the principles of the invention. In the drawings: Fig. 1A is a block diagram of a mobile terminal according to an embodiment of the present invention; Figures IB and IC are conceptual views that show an example of a mobile terminal, seen from different directions; Fig. 2 is a flowchart showing a control method according to an embodiment of the present invention; Fig. 3 is a conceptual view which illustrates the control method of Fig. 2; Figs. 4A to 4D are conceptual views illustrating a method of activating a camera of a mobile terminal to access secure information according to an embodiment of the present invention; Figures 5A, 5B, 6A, 6B, 7, 8 and 9 are conceptual views illustrating a method of securing in a mobile terminal according to an embodiment of the present invention; Fig. 10 is a conceptual view illustrating a method of transmitting secure information to a subject to be captured in a mobile terminal according to an embodiment of the present invention; FIGS. 11A, 11B, 11C, 12A and 12B are conceptual views illustrating a method of executing a function associated (or linked) with secure information, in a mobile terminal according to an embodiment of the present invention; Figs. 13A and 13B are conceptual views illustrating a method of sharing secure information in a mobile terminal according to an embodiment of the present invention; Figs. 14A and 14B are conceptual views illustrating a security information recording method, in a mobile terminal according to an embodiment of the present invention; Figs. 15A, 15B, 16A, 16B and 17 are conceptual views illustrating a method of providing secure information associated with a web page, in a mobile terminal according to an embodiment of the present invention; and Figures 18A, 18B, 18C, 19A, 19B and 20 are conceptual views illustrating a method of providing secure information associated with edited information on a touch screen in a mobile terminal according to an embodiment of the present invention. We will now proceed to a detailed description of the invention, according to the embodiments disclosed herein and in light of the accompanying drawings. To abbreviate the description made with reference to the drawings, identical or equivalent components may be indicated by identical or similar numerical references, and we will not repeat their description. In general, a suffix such as "module" and "unit" may be used to designate elements or components. The use of such a suffix in this document is for the sole purpose of facilitating the description of the Brief, since the suffix itself is not intended to constitute a special meaning or function. The accompanying drawings make it easy to understand various technical features and it should be understood that the embodiments presented herein are in no way limited by the accompanying drawings. As such, the present invention is intended to encompass all modifications, equivalents and substitutes in addition to those specifically indicated in the accompanying drawings. The mobile terminals presented here can be implemented through various terminals of different types. Examples of these terminals include cell phones, smartphones or "smartphones", user devices, laptops, digital broadcast terminals, personal digital assistants (PDAs), portable media players, browsers , digital slates, digital tablets, ultrabooks, worn devices (eg, smart watches, smart glasses, virtual reality headsets) and the like. As an example of strictly non-limiting nature, we will deepen our description by referring to particular types of mobile terminals. The explanations given, however, also apply to other types of terminals, such as the types mentioned above. In addition, these explanations may also apply to fixed terminals such as digital TVs, desktops and the like. Referring now to Figures IA to IC, where Figure IA is a block diagram of a mobile terminal according to an embodiment of the present invention and Figures IB and IC are conceptual views illustrating a first terminal example. mobile, seen from different directions. The mobile terminal 100 is shown having components such as a wireless communication unit 110, an input unit 120, a detection unit 140, an output unit 150, an interface unit 160, a memory 170, a controller 180 and a power supply unit 190. It is not mandatory to implement all the components shown, and a greater or lesser number of components can also be implemented. In more detail, the wireless communication unit 110 may generally comprise one or more modules that allow communications such as wireless communications between the mobile terminal 100 and a wireless communication system, communications between the mobile terminal 100. and another mobile terminal, communications between the mobile terminal 100 and an external server. In addition, the wireless communication unit 110 may generally comprise one or more modules that connect the mobile terminal 100 to one or more networks. The wireless communication unit 110 may comprise one or more of the following: a broadcast receiving module 111, a mobile communication module 112, a wireless Internet module 113, a short-range communication module 114, and a location information module 115. The input unit 120 may comprise a camera 121 or an image input unit which makes it possible to obtain images or video, a microphone 122 which is a type of device audio input device for inputting an audio signal; and a user input unit 123 (for example, a touch key, a mechanical key, and the like) that allows a user to enter information. Data (e.g., audio, video, image, and the like) can be obtained by the input unit 120 and can be analyzed and processed according to user commands. The detection unit 140 may generally be implemented using one or more sensors designed to detect the internal information of the mobile terminal, the ambient environment of the mobile terminal, user information and the like. For example, the detection unit 140 may comprise at least one of the following sensors: a proximity sensor 141, a lighting sensor 142, a touch sensor, an acceleration sensor, a magnetic sensor, an accelerometer, a sensor a gyroscope, a motion sensor, an RGB sensor, an infrared (IR) sensor, a fingerprint sensor, an ultrasonic sensor, an optical sensor (for example, the camera 121), a microphone 122, a battery meter, a room sensor (for example, a barometer, a hygrometer, a thermometer, a radiation detector, a thermal sensor and a gas sensor, among others), and a chemical sensor (for example, an electronic nose, a medical sensor, a biometric sensor and the like). The mobile terminal described herein may be adapted to use the information obtained from one or more sensors of the detection unit 140, and combinations thereof. The output unit 150 may generally be designed to provide various types of information, including audio, video, tactile and similar outputs. The output unit 150 may be shown having a display unit 151, an audio output module 152, a haptic module 153 and an optical output module 154. The display unit 151 may have an intermediate layer structure or integrated structure with a touch sensor to simplify the touch screen. The touch screen may constitute an output interface between the mobile terminal 100 and a user, and it may also function as a user input unit 123 which constitutes the input interface between the mobile terminal 100 and the user. user. The interface unit 160 serves as an interface with different types of external devices that can be coupled to the mobile terminal 100. The interface unit 160 may include, for example, one or more of the following: wired or non-wired ports wire, external power ports, wired or wireless data ports, memory card ports, connection ports to a device with an identification module, input / output ports (I / O) audio, video I / O ports, headphone ports, and the like. In some cases, the mobile terminal 100 may perform various control functions associated with a connected external device, when the external device is connected to the interface unit 160. The memory 170 is generally implemented in such a way as to store data enabling the various functions or characteristics of the mobile terminal 100 to be supported. For example, the memory 170 may be designed to store application programs executed in the mobile terminal 100. data or instructions relating to the operations of the mobile terminal 100 and the like. Some of these application programs can be downloaded from an external server via wireless communication. Other application programs may be installed in the mobile terminal 100 during its manufacture or its transport, which is generally the case for the basic functions of the mobile terminal 100 (for example, the reception of a call, the establishing a call, receiving a message, sending a message and the like). It is common for application programs to be stored in the memory 170, installed on the mobile terminal 100 and executed by the controller 180 to perform an operation (or function) for the mobile terminal 100. The controller 180 generally has the function of controlling the overall operation of the mobile terminal 100, in addition to the operations associated with the application programs. The controller 180 can provide or process user-adapted information or functions by processing the signals, data, information, and the like that are input or output of the various aforementioned components, or by activating application programs stored in the application. memory 170. In addition, the controller 180 controls all or part of the components shown in FIG. 1A according to the execution of an application program that has been stored in the memory 170. In addition, the controller 180 can control at least two of these included components. in the mobile terminal to activate the application program. The power supply unit 190 may be designed to receive external energy or provide internal energy to provide the energy required for the operation of the elements and components included in the mobile terminal 100. The power supply unit 190 may comprise a battery, the battery can be designed to be integrated into the body of the terminal or designed to be separated from the body of the terminal. At least a portion of the components may operate cooperatively to implement an operation, control, or method of controlling a mobile terminal in accordance with various embodiments described herein. In addition, the operation, command or control method of the mobile terminal can be implemented on the mobile terminal by activation of at least one application program stored in the memory 170. For some time, with the development of digital technologies, the lives of users have generally been digitized. For example, for a digital lock, the opening or closing of the door can be controlled from information entered through an input element provided in the digital lock. In this respect, household appliances or Internet sites increasingly require the input of security information or personal data. As a result, the amount of personal data or security information (for example a password) that a user must remember keeps increasing. Therefore, an embodiment of the present invention is the provision of a mobile terminal and the corresponding method for providing security information or personal data to a user although the user does not remember this information. In the present invention, "security information" or "personal data" is commonly referred to as "secure information". In addition, the secure information corresponds to information entered by a user or information transmitted from at least one external device or an external server. For example, the password of a lock can be entered on a terminal by a user, and the controller can secure the password information (turn the password information into security information). Here, "secure" means to convert (change) general information into secure information so that this general information can not be edited without an authentication process to edit on a terminal. The authentication process is executed to edit secure information. The secure information is edited on the terminal once the authentication process is complete, that is, after successful authentication. The authentication process can be executed by one of several authentication methods, which we will explain later. In addition, the process of choosing (setting or processing) specific information as secure information can be executed in different ways, and different embodiments can occur for each of the graphical interfaces provided by individual terminal, so that we do not we will not detail. The description of this Brief assumes that secure information has already been provided (exists). We will now describe in detail a method of providing secure information to a user while maintaining security, in the light of the accompanying drawings. In particular, FIG. 2 is a flowchart showing a control method according to an embodiment of the present invention, and FIG. 3 is a conceptual view which illustrates the control method of FIG. The mobile terminal according to one embodiment of the present invention can recognize a subject (or an object) to be captured through an image (or preview) received from the camera 121 provided in the terminal, and provide security information related to the subject. In more detail, in the mobile terminal according to one embodiment of the present invention, the controller 180 edits a preview received through the camera 121 (S210). For example, as we see in part (a) of Figure 3, a preview is edited on a touch screen 151. Here, the preview is an image before storing an image received from the camera 121 in the memory 170. More precisely, the preview is edited before capturing the image received via the camera 121. Moreover, the preview can also be stored in the memory 170, but is stored only temporarily. . In addition, the controller 180 recognizes a subject (object), to be captured by the camera 121, from the preview (or image) (S220). The subject (object) to be captured by the camera corresponds to a graphic object included in the image received through the camera. More precisely, the preview received via the camera includes a graphic object 310 corresponding to the subject (for example an image corresponding to a lock). Thus, the controller 180 can recognize the subject through the graphic object 310 included in the preview. In addition, when a plurality of subjects are recognized from the image, the controller 180 can decide on a graphic object corresponding to a target, on which secure information is provided, among the plurality of graphic objects included in the the preview, depending on the area that the graphic object included in the preview occupies on the image, based on a user's choice, etc. The controller 180 may also decide on a graphic object (or subject) which is the target on which the secure information is provided, in response to a touch applied to one of the plurality of graphic objects. In addition, the controller 180 may provide secure information related to the graphic object that occupies the largest area of the preview, among the plurality of graphic objects. In addition, the recognition of the subject may mean i) that a graphical object 310 corresponding to the subject has been distinguished on the image, and ii) that even an attribute of the subject has been recognized (searched, identified, etc.) from of the preview as well as the distinguished graphic object 310 corresponding to the subject. In addition, an "attribute of the subject" includes information relating to at least either the subject's type or the subject's use. Moreover, as already mentioned, after the subject has been recognized from the preview, if there is secure information about the subject, the controller 180 executes an authentication process to edit this information. of security (S230). In addition, "the existence of secure information relating to the subject" means that secure information corresponding to the subject exists in the memory 170 or on an external server. The memory 170 or the external server may include an image corresponding to the subject and secure information corresponding to the image in an associated manner. The image and the secure information on the image are called associated information. In addition, the associated information is information in which an image corresponding to each of at least one subject is related (associated) to secure information corresponding to each of the at least one subject. For example, the associated information may include a first image corresponding to a first subject and first secure information corresponding to the first image. In addition, the associated information may include a second image corresponding to a second subject, which is different from the first subject, and second secure information corresponding to the second image. In addition, when the subject is recognized from the preview, the controller 180 determines whether an image and secure information corresponding each to the recognized subject are included or not in the associated information stored in the memory, and executes the process of authentication to edit the secure information according to the result of the determination. For example, as we see in part (b) of FIG. 3, when the secure information relating to the recognized subject is included and the authentication process is thus executed, the controller 180 can edit guidance information indicating that secure information can be edited. For example, the controller 180 may edit the guidance information, such as "This lock has been registered. Scan your finger to display the password. Thus, the user can be guided to perform the authentication process. Therefore, the guidance information includes induction information to cause the user to enter the authentication information that is necessary to edit the secure information. In addition, the authentication process is executed to edit the secure information. Specifically, the controller 180 can edit the secure information only when the authentication process is complete, that is, the authentication has succeeded. The authentication process can also be executed by one of several authentication methods, which we will explain later. In addition, once the authentication process has been executed (S230) and has been performed based on the authentication information entered by the user, the controller 180 edits the secure information in the mobile terminal ( S240). In addition, the controller 180 can determine whether the authentication information entered by the user is identical (or matches) with or without prerecorded authentication information. If the authentication information entered is identical to the prerecorded authentication information, the controller 180 can edit the secure information. For example, as we see in part (c) of Figure 3, the authentication process is done by reading fingerprint. When a fingerprint that has been predefined to give access to the secure information is recognized through a fingerprint sensor provided in the terminal, the controller 180 can edit secure information 320, as we see in part (d). ) of Figure 3. In addition, the secure information 320, as seen in the drawing, can be visually delivered on the touch screen 151. In addition to this output method, the secure information can also be audibly edited through the control module. audio output 152. As explained above, the mobile terminal according to one embodiment of the present invention can recognize a subject from an overview received through the camera and provide secure information relating to the subject through a predetermined authentication process. Therefore, a user can obtain secure information about the subject even if he does not remember this secure information in detail. Now, we will describe in more detail the function illustrated in Figures 2 and 3, namely, a method of accessing a function providing secure information relating to a recognized subject from an overview received by the through the camera, referring to the accompanying drawings. In particular, Figs. 4A-4D are conceptual views illustrating a method of activating a camera of a mobile terminal to access secure information according to an embodiment of the present invention. As explained above, the mobile terminal can recognize a subject through a preview received through the camera, and provide secure information about the recognized subject. More precisely, in order to perform the above-mentioned function, it is necessary to activate the camera. Therefore, the mobile terminal according to one embodiment of the present invention can further provide the application-based function corresponding to an image capture function. For example, when an image capture application or a camera application installed on the terminal is executed, the controller 180 can activate a camera and receive an image signal through the activated camera. An image corresponding to the image signal can also be edited on the touch screen 151. When there is secure information relating to a subject corresponding to a graphic object included in the received image, the controller 180 can then edit information guidance (see part (b) of FIG. 3) signaling the existence of the subject. In addition, the controller 180 can edit an icon for signaling the existence of secure information relating to the subject, before editing the guidance information. When the icon is selected, the controller 180 may edit the guidance information to cause the user to perform an authentication process. On the other hand, once the image capture application or the camera application has been executed, and when a function associated with the output of the secure information is selected by the user, the controller 180 can recognize the subject . The controller 180 may perform a process for editing the secure information relating to the recognized subject. Thus, the function of providing secure information relating to the subject can be provided through the image capture application. In addition, the image capture application can be preinstalled during the shipping of the mobile terminal. Alternatively, the image capture application can be downloaded from an external server and installed on the mobile terminal. In addition, the function providing the secure information relating to the subject can be provided through a separate application, from the image capture application. This separate application can be preinstalled when shipping the mobile device. Alternatively, the separate application can be downloaded from an external server and installed on the mobile terminal. Now, we will describe in more detail a method of providing security information relating to a subject through a separate application, with reference to the accompanying drawings. In addition, the mobile terminal according to one embodiment of the present invention may be designed such that access to a function that provides secure information relating to a recognized subject from an image captured by a camera is allowed. even if the mobile terminal is in the locked state. For example, as seen in FIG. 4A, when the touch screen 151 is activated in the locked state of a mobile terminal, a lock screen 401 is edited on the touch screen 151. A graphic object (or an icon) 410 is displayed on the lock screen 401 to activate a function providing secure information relating to a subject that is recognized from an image captured by a camera. More specifically, a user can select the icon 410 displayed on the lock screen 401 to perform a function associated with an output of the secure information. Thus, the mobile terminal provides access to the function associated with the output of secure information directly on the lock screen, which improves the comfort of the user. In addition, when the icon 410 is selected, the process described in Figures 2 and 3 is executed. As another example, as we see in FIG. 4B, a graphic object (or an icon) 420 is displayed on a home screen page 402 for activating a function for providing the secure information relating to a subject that is recognized from an image captured by a camera. When the icon 420 is selected, the process described with reference to FIGS. 2 and 3 is executed. As another example, as we see in FIG. 4C, a graphic object (or an icon) 430 making it possible to activate a function for providing secure information relating to a subject that is recognized from an image captured by a camera may appear on a status display window (a function control window, a curtain window, a command window, or an indicator window) 403. In more detail, the status display window 403 is displayed when a predefined touch (e.g., drag) having a predefined direction is applied to a predefined edge of the touch screen 151. The display window state 403 thus displayed can be closed when the predefined touch has a direction that is opposite to the predefined direction. In addition, when the graphic object 430 included in the status display window 403 is selected, the status display window 403 disappears and the image received through the camera is displayed. Next, the process described with reference to Figures 2 and 3 is executed. As another example, as we see in FIG. 4D, the controller 180 can perform the process described with reference to FIGS. 2 and 3 when user input is applied to an input element 130 (for example a protection key or a press key) provided on the terminal. In addition, the controller 180 may perform the process described with respect to FIGS. 2 and 3 in response to a user's movement applied to the terminal as long as it meets a predefined condition. As explained above, the mobile terminal according to one embodiment of the present invention can provide a function of editing secure information through a camera in different ways. Now, we will describe in more detail the authentication process of the processes described with reference to Figures 2 and 3 with reference to the accompanying drawings. In particular, Figs. 5A, 5B, 6A, 6B, 7, 8 and 9 are conceptual views illustrating a method of securing in a mobile terminal according to an embodiment of the present invention. As explained above, a subject is recognized from an image (or preview) received through the camera, and an authentication process for editing secure information relating to the subject. subject is executed when this secure information exists. There are several variants of the authentication process for editing the secure information. Indeed, the authentication process can be performed by one of the various authentication methods. Any type of authentication method may be employed if it can authenticate a user who is authorized to access secure information. For example, the authentication process is executed by an authentication method corresponding to a fingerprint reading method. Through this authentication process, the user who is authorized to access the secure information can be authenticated. In this case, the mobile terminal according to an embodiment of the present invention may further include a fingerprint sensor for recognizing the fingerprint touching the mobile terminal. In more detail, the fingerprint sensor, as we see in part (a) and (b) of FIG. 5A, can be arranged on a user input unit 130 provided on the rear surface 103 of the terminal . The user input unit 130 may be a touch sensor covered by the fingerprint sensor. As another example, the user input unit 130 may be a key to be pressed (protection key or physical key) that the fingerprint sensor covers. Once guidance information 510 is displayed, when the fingerprint touching the fingerprint sensor is the same (or matches) the fingerprint information on a user who is authorized to access the secure information , the controller 180, as we see in part (b) of Figure 3, can edit secure information. In other words, the controller 180 can edit the secure information when the fingerprint of the user scanned by the fingerprint sensor corresponds to fingerprint information pre-recorded on the user. In addition, the display times of the guidance and reading information of the fingerprint and the fingerprint sensor are not limited to the aforementioned moments. In another example, the fingerprint sensor may be provided on the touch screen 151. For example, the fingerprint sensor may be designed to cover at least a portion of the touch screen 151. Alternatively, the fingerprint sensor may be provided inside the touch screen 151. In this case, the controller 180 can recognize the fingerprint of the user who touches the touch screen 151, through the screen Touch 151. In addition, the controller 180, as we see in parts (a) and (b) of Figure 5B, can edit a graphic object 521 signaling the area where the fingerprint sensor is located. More specifically, the graphic object 521 allows the user to recognize the area to be touched by his finger for reading the fingerprint. The graphic object 521 may be included in guidance information 520 which provides access to the secure information. In addition, when a fingerprint is scanned on another zone, different from the zone where the graphic object 521 is displayed since the fingerprint sensor is disposed in the other zone, the controller 180 does not use the scanned fingerprint information as authentication information. More specifically, the controller 180 can use the scanned fingerprint as authentication information to perform the authentication process only if the fingerprint is scanned over a predefined area. This system makes it possible to verify that the user really intends to use the secure information. As another example, the fingerprint sensor may be on the front surface of the terminal. For example, the fingerprint sensor, as we see in part (b) of Figure 5B, may be disposed on the user input unit 130 provided on the front surface of the terminal. The user input unit 130 may be referred to as the "Home key" and the Home key may be presented as a touch sensor covered by the fingerprint sensor. As another example, the Start key may be a key to be pressed (protection key or physical key) that the fingerprint sensor covers. In addition, the Start key can be a key to be pressed on which are disposed both the touch sensor and the fingerprint sensor. As we see in part (b) of FIG. 5B, the controller 180 may also include indication information 531 relating to a position to be touched by the finger for reading the fingerprint, in the information guide 530 for secure information. When the authentication process is executed through the fingerprint reading process, the controller 180 can edit the secure information only while the fingerprint of the user who is authorized to access the secure information is scanned on the fingerprint sensor. More specifically, in this case, when the predefined finger of the user is removed from the fingerprint sensor, the display of the secure information stops. In addition, when the authentication process is complete, the controller 180 may continuously display the secure information, although the user's predefined finger has been released from the fingerprint sensor. In this case, when a specific key (protection key or key to be pressed) corresponding to a cancellation function is selected, the display of the secure information can be stopped. In addition, the authentication process may be executed based on authentication information entered by the user into the mobile terminal according to an embodiment of the present invention. In more detail, the authentication information may be predefined information of the password type, PIN code and the like. For example, as seen in part (a) and (b) of FIG. 6A, when a subject having secure information is recognized, the controller 180 can edit guidance information 610 to guide the display of the information. secure information. In addition, the controller 180 may also display an input area 620 allowing the user to enter authentication information. In addition, the controller 180 may also display a numeric keypad 630 on the touch screen 151 so that the user can enter the authentication information. The password or PIN code entered via the numeric keypad 630 can be displayed in Entry Area 620. In addition, a password or PIN code, as we see in part (a) and (b) of Figure 6B, can be entered, in response to a touch applied to an input area 640. Numbers or arbitrary characters may be initially entered into the input area 640. These numbers or characters may change depending on a touch applied to the input area 640. When the numbers entered in the input area 640 correspond to predefined authentication information, the controller 180 can determine that the authentication process has been completed successfully. In another example, the authentication information may be a touch pattern (or unlock code) defined by a plurality of taps. As seen in Fig. 7, when a predefined touch pattern is applied to a touch area 720 of a guide 710 on which a touch pattern has been inputted, the controller 180 can determine that the authentication process has been performed. with success. The touch pattern can be defined by a number of taps or by the relative positions of continuous touches. The predefined tactile pattern can be identified (distinguished) from a touch entered by the user. As another example, as we see in Figure 8, the controller 180 may authenticate a user who is authorized to access secure information through facial recognition. In this case, a rear camera of the terminal can capture a subject, and a front camera 121 can capture the user. In this case, the recognized image 811 of the face of a user can be displayed on the touch screen 151. When the recognized user face is the user who is authorized to access the secure information, the controller 180 , as explained with reference to FIGS. 2 and 3, can edit the secure information. In addition to this, the present invention may employ various authentication methods, including voice recognition, retinal recognition, eye scanning, etc., to authenticate the user who is authorized to access the secure information. A guide 810 is also displayed on the touch screen 151 to inform the user of the facial recognition process. The decision to use one of the various authentication methods to authenticate a user authorized to access secure information may depend on a choice of the user. In one example, as seen in Figure 9, the mobile terminal displays guidance information 910 to cause the user to choose an authentication method, before performing the authentication process. The guidance information 910 may include a plurality of graphic objects 911, 912 and 913 corresponding to different authentication methods. The controller 180 may perform a different authentication process depending on the graphic object chosen from the plurality of graphic objects 911, 912 and 913. Each authentication method is included in the foregoing description. Through the authentication process, the secure information can be displayed on the terminal. In addition to being displayed on the terminal, the secure information, as seen in Figure 10, can also be sent to the subject. In particular, Fig. 10 is a conceptual view illustrating a method of transmitting secure information to a subject in a mobile terminal according to an embodiment of the present invention. More specifically, when the recognized subject can establish wireless communication with the terminal, the controller 180 can transmit the secure information to the recognized subject through a wireless communication unit. In this case, it may prevent the user the disadvantage of directly entering the secure information relating to the subject. For example, when the subject is a lock and the secure information is the password of the lock, the terminal can transmit the password to the subject. This avoids, therefore, having to directly enter the password of the lock. Now, we will describe in more detail a function associated with secure information by referring to the accompanying drawings. In particular, Figs. 11A-11C and 12A-12B are conceptual views illustrating a method of performing a function associated with secure information in a mobile terminal according to an embodiment of the present invention, and Figs. 13A and 13B are conceptual views illustrating a method of sharing secure information in a mobile terminal according to an embodiment of the present invention. The mobile terminal according to one embodiment of the present invention can provide yet another function, in addition to the function of displaying secure information relating to a recognized subject from an overview received through the camera. This additional function, for example, may consist of modifying secure information or sharing secure information with another terminal or an external server. For example, as we see in part (a) of Fig. 11A, when secure information 1111 is displayed after the authentication process is complete, the controller 180 can edit a graphic object (or an icon) 1110 associated with performing an additional function related to secure information. When the graphic object 1110 is selected, the controller 180, as we see in part (b) of FIG. 11A, can edit a list 1115 comprising elements (or graphic objects) corresponding to additional functions, respectively. For example, additional features include modifying secure information, and sharing secure information with another user. In addition, the additional function can be performed without an authentication process since it executes once the authentication process for editing the secure information is complete. Thus, an interface for inputting an additional function (e.g., displaying the graphic object 1110 to input the additional function), as seen in FIG. 11A, can be provided simultaneously with displaying the information secure, or after, once the authentication process is complete. The interface for entering the additional function, as we see in part (a) of Fig. 11B, can be provided even before the secure information is displayed. For example, the graphical object (or icon) 1110 associated with the execution of the additional function related to the secure information may be displayed along with the guidance information 1115 signaling the existence of the secure information. In this case, when the graphic object 1110 is selected, as we see in part (b) of FIG. 11B, elements (or graphic objects) corresponding to additional functions, respectively, can be displayed. When one of the elements corresponding to the additional functions is selected, the authentication process may be performed according to the type of the selected function. For example, as we see in part (b) of Fig. 11B, when the secure information modification function is selected, the controller 180 can perform the authentication process, as we see in parts (c) and (d) of Figure IB. Moreover, as seen in FIG. 1 IC, elements corresponding to the additional functions can be displayed together with secure information 1140. Therefore, the user can directly enter the additional function simultaneously without receiving the secure information 1140. Further, when the password change function is selected through the aforementioned methods, as we see in part (a) of FIG. 12A, the controller 180 can edit a parameter screen 1210 allowing a user enter new security information (or a new password). As we see in part (b) of FIG. 12A, when the new security information is entered by the user in the setting screen 1210, the newly entered security information, as we see in the part (FIG. c) of Figure 12A, can be saved as secure information associated with the subject. In this case, related information about the subject may change. Specifically, the secure information associated with an image corresponding to the subject included in the associated information can be changed to newly entered security information. Thus, when the secure information changes, the controller 180 may transmit the modified secure information to the subject (or to an electronic device corresponding to the subject). In this case, the electronic device corresponding to the subject can modify predefined secure information according to the modified secure information received from the terminal. Further, as we see in part (b) of FIG. 12A, when new security information is entered and their registration is selected, the authentication process can be performed. Once the authentication process has been successfully executed, the controller 180 can transform prerecorded secure information into new security information. In addition, when the secure information changes, as already mentioned, the controller 180 may share the modified information with another user. In this case, the controller 180 may transmit the modified secure information to the other user's terminal that shares the secure information. Information about the other user sharing the secure information may exist in the memory 170. As another example, the controller 180 may transmit the modified secure information to the terminal of another user selected by the user. For example, the controller 180 can edit a graphic object corresponding to at least one terminal belonging to the same home network as the terminal, and transmit the modified secure information to another user corresponding to a graphic object selected from the graphic objects. In addition, the terminal that has received the modified secure information, as we see in part (a) of FIG. 13B, can edit guidance information 1330 signaling the modification of the secure information, based on the modified secure information received from the mobile terminal. The terminal that has received the modified secure information may display the modified secure information 1340, as we see in (b) of Figure 13B, when a predefined authentication process is completed. As we see in part (a) of FIG. 12B, when the secure information sharing function is selected from among the additional functions of a guide 1240, the controller 180, as we see in part (b) of FIG. Figure 12B, may edit a list 1250 to select a target (a person or another user) with which the secure information will be shared. The list 1250 can display graphical objects 1251, 1252 and 1253 which represent the users intended to share the secure information. When one of the graphic objects is selected, the controller 180 can transmit the secure information to a terminal corresponding to the selected graphic object or to an external server. The controller 180 may define the user to share the secure information as a user belonging to the same home network as the mobile terminal according to one embodiment of the present invention. In addition, the terminal that has received the secure information can edit guidance information 1310 signaling the receipt of the secure information, as we see in part (a) of Figure 13A, based on the secure information received from the mobile terminal. The terminal that has received the modified secure information can edit the received secure information 1320, as we see in part (b) of Fig. 13A, when a predefined authentication process is completed. In addition, the mobile terminal according to an embodiment of the present invention can edit guidance information to induce the modification of the secure information so that the user modifies the secure information, when this secure information has not been changed since a predefined time. We have described the above examples on the basis that secure information about a recognized subject from an overview received through the camera existed. In addition, the mobile terminal according to one embodiment of the present invention can provide a process of recording secure information corresponding to a subject, when a preview is received through the camera and that there is no secure information relating to the recognized subject from the received survey. Now, we will describe in more detail a method of recording secure information, referring to the accompanying drawings. In particular, Figs. 14A and 14B are conceptual views illustrating a method of recording security information in a mobile terminal according to an embodiment of the present invention. In the mobile terminal according to an embodiment of the present invention, the controller 180 may perform a process of recognizing a subject from a preview received through the camera, and recording secure information relating to the subject recognized when there is no secure information about the subject. For example, as we see in part (a) of Figure 14A, when a subject is recognized but there is no secure information related to the recognized subject, that is, when there is no There is no associated information, the controller 180, as we see in part (b) of Figure 14A, can edit guidance information 1410 to induce the registration of the secure information. More specifically, when it turns out that there is no associated information corresponding to the recognized subject, the controller 180 can edit the guidance information 1410 so that the user can choose whether or not to create associated related information. about recognized. When the registration of secure information relating to the recognized subject is selected, as we see in (c) of Figure 14A, an authentication process can be performed. Once the authentication process has been successfully executed, the controller 180 may perform a process of entering security information to be associated with the subject. The controller 180 may also perform the process of entering the security information to be associated with the subject even if the authentication process has not been performed. For example, as seen in Fig. 14B, a setting screen 1410 allowing the user to enter security information may be displayed on the touch screen 151. The controller 180 may record the entered security information. through the setup screen 1410 as secure information corresponding to the subject. In more detail, when the creation of associated information relating to the recognized subject is selected, more specifically, when the recording of the security information related to the recognized subject is selected, the controller 180 can capture a preview received through the camera and obtain an image corresponding to the recognized subject. When the security information relating to the recognized subject is entered by the user, the controller 180 may associate the input of the security information with the obtained image so as to create the associated information corresponding to the recognized subject. Once the security information has been entered, the controller 180 may allow the user to select an authentication method or enter authentication information. More specifically, the present invention makes it possible to select or enter an authentication method or authentication information to perform the authentication process that is executed to display the secure information relating to the recognized subject while the information is being recorded. of security. The foregoing embodiment showed a method of recognizing a specific subject from an overview received through the camera and providing secure information about the recognized subject. In addition, without limiting itself to examples, the present invention can provide connection information relating to a web page to which one wishes to connect, when this web page as well as a specific subject are recognized from an overview received by through the camera. We will describe them in detail by referring to the accompanying drawings. In particular, Figs. 15A, 15B, 16A, 16B and 17 are conceptual views illustrating a method of providing secure information associated with a web page, in a mobile terminal according to an embodiment of the present invention. First, as we see in part (a) of Figure 15A, when a Web site or Web page 1501 to which we wish to connect is recognized from a preview received through the camera , the controller 180 can determine whether secure information (for example connection information comprising at least one identifier or a password) relating to the recognized web page exists or not in the memory 170 or on an external server. When it turns out that connection information relating to the recognized web site or web page exists, the controller 180 performs an authentication process to edit the secure information. Further, as we see in part (b) of Fig. 15A, the controller 180 may edit guidance information 1520 that includes at least either notification information signaling the existence of secure information related to the recognized website. or notification information signaling the requirement to perform an authentication process to display the secure information. As we see in part (c) of FIG. 15A, once the authentication process has been successfully executed through a predefined authentication method (for example at least one of the authentication methods described with reference to Figs. 5A-9), the controller 180, as we see in part (d) of Fig. 15A, can edit the secure information 1530 related to the recognized web site or web page. The controller 180 may distinguish a web page or website from an image of the logo 1510 of the web page or web site included in the image (see (a) of Figure 15A). In addition, the memory 170 or the external server may store associated information indicating that an image of the logo of a website or web page and connection information coincide. When the logo of the website or web page is recognized from the preview, the controller 180 may search for associated information to confirm whether the login information corresponding to the logo exists or not. As seen in part (d) of FIG. 15A, the secure information (or connection information) 1530 may be displayed on the touch screen 151. As another example, the controller 180 may transmit the secure information to a server corresponding to the website or the web page. In this case, the connection to the website or web page can be done automatically. The server can provide the website or the login webpage on a computer (or a PC) used by the user of the mobile terminal, based on information about the computer on which the website or page is displayed. Web and information about the mobile device that is capturing the website or web page. Moreover, in the mobile terminal according to an embodiment of the present invention, when the secure information (or connection information) relating to the website or the web page have not been modified for a predefined period of time, as seen in FIG. 15B, the controller 180 can edit guidance information 1535 to induce the modification of the secure information to induce the modification of said information. As we see in parts (b) and (c) of Fig. 15B, when the secure information 1540 is changed, the controller 180 may transmit the modified secure information to the server corresponding to the website or web page. In this case, the server corresponding to the website or the web page can transform the predefined secure information into received information. This allows the user to change the login information for the website or web page by simply changing the login information on the mobile terminal, which is very convenient. In addition, in the mobile terminal according to an embodiment of the present invention, when a subject is recognized from an overview received through the camera and that there is no secure information relating to the recognized subject, the controller 180 can perform a process for recording the secure information relating to the recognized subject. For example, as we see in part (a) of Figure 16A, when a Web page (or Web site) 1600 is recognized but there is no secure information related to the recognized web page. , i.e. when there is no associated information, the controller 180, as we see in part (b) of FIG. 16A, can edit guidance information 1620 to induce registration of secure information. More specifically, when it turns out that there is no associated information corresponding to the recognized web page, the controller 180 can edit the guidance information 1620 allowing the user to choose to create or not the information related to the recognized topic. When the registration of secure information relating to the recognized subject is selected by the user, the controller 180, as we see in part (c) and (d) of Figure 16A, can perform the authentication process. Once the authentication process has been successfully executed, the controller 180 may perform a process in which the user enters security information to be associated with the subject. On the other hand, the controller 180 may directly perform a process of receiving the security information to be associated with the subject from the user, even without performing the authentication process. Thus, when the registration of the connection information relating to the web page included in the preview is selected, as we see in part (a) of Figure 16B, a setting screen allowing the user to enter the connection information (or security information) may be displayed on the touch screen 151. The controller 180 may record the connection information entered through the setting screen as connection information (or information secure) associated with the recognized web page through the preview. In more detail, when the creation of associated information relating to the recognized web page is selected, that is, when the recording of the connection information relating to the recognized subject is selected, the controller 180 can capture the received preview through from the camera, so as to obtain an image corresponding to the recognized web page. Further, the controller 180 can acquire a logo image 1610 (see part (a) of Fig. 16A) of the web page from the image 1600. When the connection information relating to the recognized web page is entered by the user, the controller 180 can create associated information corresponding to the recognized web page by associating the connection information entered with the acquired logo image. Once the connection information has been entered, the controller 180 may allow the user to select an authentication method or enter authentication information. More specifically, in the present invention, the authentication method may be selected, or the authentication information for performing the authentication process that is executed to display the secure information relating to the recognized web page may be entered, while saving security information. In another example, in the mobile terminal according to an embodiment of the present invention, even if there is no associated information including the logo image and the connection information corresponding to the web page in the terminal when the connection information relating to the web page is prerecorded in the terminal, the prerecorded connection information may be used to provide the connection information relating to the recognized web page. For example, as we see in part (a) of Figure 17, when a web page is recognized from a received 1700 preview and there is no associated information related to the web page , the controller 180, as we see in part (b) of FIG. 17, can edit guidance information 1720 enabling a user to choose whether or not to create the associated information. In addition, when connection information relating to the web page has been prerecorded in the mobile terminal, the controller 180 may use the prerecorded connection information to provide connection information relating to the recognized web page. In this case, the controller 180 may allow the user to choose whether or not to save connection information stored in the mobile terminal. When the user selects the registration of the connection information stored in the mobile terminal, as we see in part (c) and (d) of FIG. 17, the controller 180 can use the connection information stored in the terminal mobile device to create associated information related to the recognized web page. In addition, the connection information stored in the mobile terminal may be connection information that has been entered on the mobile terminal to establish the connection to the web page displayed on the mobile terminal. As explained above, the mobile terminal according to one embodiment of the present invention can provide connection information relating to a recognized web page from a preview received via the camera, which Avoids the user from having to remember in great detail the login information for each different webpage or website. Thus, the mobile terminal provides connection information relating to a web page displayed on the mobile terminal and to a recognized web page from a preview received through the camera, which we will describe more detailed with reference to the accompanying drawings. In particular, Figs. 18A, 18B, 18C, 19A and 19B are conceptual views illustrating a method of providing secure information relating to information displayed on a touch screen in a mobile terminal according to an embodiment of the present invention. The mobile terminal according to one embodiment of the present invention can provide connection information associated with screen information, for which a connection operation is required, when this screen information is displayed on the touch screen 151 In addition, the screen information requiring a connection may be a web page displayed through a web browser or the screen for running an application installed on the mobile terminal. As we see in part (a) of FIG. 18A, when there is connection information relating to screen information (for example a web page) displayed on the touch screen 151, the controller 180 can edit guidance information 1870 to cause the user to perform an authentication process. As we see in parts (b) and (c) of Figure 18A, once the authentication process has been successfully executed, the controller 180 can edit connection information 1880. In addition, the controller 180 can edit the connection information directly to an area on which the connection information is entered. This saves the user the disadvantage of having to enter the connection information separately. In addition, the authentication process can be performed by at least one of the authentication methods described with reference to Figures 5A-9, which we will not describe in detail. Thus, in the mobile terminal according to one embodiment of the present invention, the controller 180 can determine whether or not there is secure information relating to the screen information (or web page) displayed on the screen. touch. When there is secure information based on the result of the determination, the controller 180 may edit guidance information to induce the authentication process associated with the display of the secure information. The guidance information may be the information 1870 intended to induce the execution of the authentication process as seen in FIG. 18A, or may be information 1830 intended to signal the existence of the connection information associated with the web page. displayed on the touch screen 151 and 1840 information to induce the execution of the authentication process, as we see in parts (a) and (b) of Figure 18B. As we see in part (d) of Figure 18B, the controller can also edit the connection information through a pop-up window 1850. Thus, once the guidance information is displayed, when the process of authentication enabling the display of the connection information (or secure information) was performed on the basis of the authentication information entered by the user, the controller 180 can command the touch screen 151 to edit the connection information . As seen in Figs. 18A and 18B, when there is connection information associated with the screen information displayed on the touch screen 151, the controller 180 can edit guidance information even without a separate request from the controller. user, to alert the user to the existence of the login information. The controller 180 may also edit connection information relating to displayed screen information only in response to a request from the user. For example, as seen in parts (a) through (c) of FIG. 18C, the controller 180 may perform a process of editing connection information when a graphical object for enabling a delivery function of connection information related to screen information 1800 displayed on the touch screen 151 is selected. For example, as shown in part (b) of FIG. 18C, a graphic object 1810 (or an icon) for activating a connection information providing function relating to screen information displayed on the screen. The touch screen 151 may be in a status display window (a function control window, a curtain window, a command window, or an indicator window) 1820. The graphic object 1810 may be displayed only when the connection information associated with the displayed screen information exists. The status display window 1820 may be displayed when a predefined touch (e.g. drag) having a predefined direction is applied to a predefined edge of the touch screen 151. The status display window 1820 displayed may be closed in response to a predefined touch having a direction opposite to the predefined direction. In addition, when the graphic object 1810 included in the state display window 1820 is selected, the controller 180 may stop displaying the status display window 1820. When the graphic object is selected, the controller 180, as we see in part (c) of FIG. 18C, can edit a guide image 1825. This guide image 1825 contains information to signal that a process of recognizing the screen information displayed on the screen. the touch screen 151 and a process for finding the connection information corresponding to the recognized screen information is in progress. In another example, as seen in Fig. 19A, the controller 180 may display on a status display region 1901 a graphic object 1910 for activating a function for providing connection information relating to information displayed. In addition, the graphical object may be displayed only when the connection information relating to the displayed screen information exists. In addition, the status display region 1901 may be a region that includes status information (battery information, radio signal information, communication method information, etc.) relating to the mobile terminal. and event notification information. In another example, as seen in Fig. 19B, the controller 180 may edit a graphic object 1920 for enabling the connection information providing function relating to the displayed screen information over an arbitrary area of the screen. In addition, the graphical object may be displayed only when the connection information relating to the displayed screen information exists. In addition, in the mobile terminal according to one embodiment of the present invention, there are several alternative embodiments of the method of providing the connection information relating to the displayed screen information, in addition to the aforementioned embodiments. In the mobile terminal according to an embodiment of the present invention, when a drawing is modified on screen information such as a web page or the like, namely when logo information is changed, the associated information may be updated with the modified information. For example, as we see in part (a) of Fig. 20, when a drawing or logo image of the displayed screen information differs from the pre-recorded information, the controller 180 may display a guide 2100 enabling a user choose whether or not to store the modified logo drawing or image instead of the pre-recorded information. When the modification of the pre-recorded information is selected by the user, the currently displayed screen information may be captured and at least a portion of the captured image may be used to update the pre-recorded information. In addition, the stored logo image can be transformed into at least a portion of the captured image. In this case, the associated information can be updated with the at least part of the captured image. As seen in part (b) of Fig. 20, the controller 180 may edit a guide 2120 indicating that the screen has changed. Moreover, as already mentioned, in addition to the method of storing the modified logo design or image according to a selection of the user, when the drawing or the like of the displayed screen information is modified even without user selection, the controller 180 can capture the image and update the associated information. In this case, the associated information may include URL information, logo image information, and connection information corresponding to the associated screen information. The controller 180 may recognize that the associated information must be changed when at least one of the information in the related information is different. More specifically, when the logo image of the web page displayed on the touch screen 151 changes, the controller 180 can compare the modified logo image with the logo image corresponding to the URL of the web page displayed in the associated information and recognize that the logo image of the webpage has changed. As explained above, according to one embodiment of the present invention, a subject to be captured can be recognized from a preview received through the camera, and secure information or information from security related to the recognized subject can be displayed. This increases the comfort of the user because the user does not need to remember the secure information about the subject in detail. In addition, according to one embodiment of the present invention, when a subject is recognized, an authentication process may be performed to authenticate a user who is authorized to access secure information. This improves the security of access to secure information, thereby protecting the privacy of the user. According to one embodiment of the present invention, when a website (or a website) that requires connection to it is displayed, the web page may be recognized. When a predefined authentication process is completed, secure information (or connection information) relating to the web page is provided. As a result, the user does not need to remember information about a site requiring a connection separately, which improves user comfort. According to one embodiment of the present invention, when a user who is authorized to access secure information is recognized, a graphical object for guiding access to secure information is displayed, and various security related functions are disclosed. performed according to various touch gestures applied to the graphic object. As a result, the user can perform the security related functions in a more intuitive and convenient manner by using only the graphic object, without going through several menu steps to execute said functions. The present invention can be implemented as computer readable codes on a program recording medium. The computer readable medium may include any type of recording device each storing data readable by a computer system. Examples of such computer readable media may include a read only memory (ROM), random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage element, and the like. In addition, the computer-readable medium can also be implemented in a carrier waveform (e.g., transmission over the Internet). The computer may include the controller 180 of the mobile terminal. Therefore, it is also to be understood that the embodiments described above are not limited by any of the details of the foregoing description, unless otherwise indicated, but are to be broadly considered within the scope of the latter as it may be. is defined by the protection sought.
权利要求:
Claims (15) [1" id="c-fr-0001] A mobile terminal (100) comprising: a camera (121) provided in the body of the terminal; a touch screen (151) adapted to display a preview received through the camera; and a controller (180) adapted to: perform an authentication process associated with an object (310) in the preview and to obtain secure information for operating the object in the preview, and edit the information secure once the authentication process has been successfully executed based on the authentication information entered. [2" id="c-fr-0002] The mobile terminal of claim 1, further comprising: a memory (170) adapted to store associated information that associates objects with corresponding secure information, wherein the controller (180) is further adapted to perform the process of authentication when the object includes associated secure information associated in the memory. [3" id="c-fr-0003] The mobile terminal of claim 2, wherein the controller (180) is further adapted to: edit guidance information (510) for inputting corresponding new secure information for the object when the corresponding secure information is not included not in memory (170) for the purpose of the preview. [4" id="c-fr-0004] The mobile terminal of claim 3, wherein the controller is further adapted to: capture the preview and obtain an image corresponding to the object, and associate the image with the corresponding new secure information entered in the memory. [5" id="c-fr-0005] The mobile terminal of any one of claims 1 to 4, wherein the controller is further adapted to: edit guidance information (510) for inputting the authentication information. [6" id="c-fr-0006] The mobile terminal of claim 5, further comprising: a fingerprint sensor configured to detect the fingerprint of a finger touching it, wherein the controller is further adapted to edit the secure information when the fingerprint detected by the fingerprint sensor corresponds to prerecorded fingerprint information. [7" id="c-fr-0007] The mobile terminal according to any one of claims 1 to 6, wherein the controller is further adapted to: modify the secure information to enter new secure information, in response to a request to modify the secure information relating to the object after display of secure information. [8" id="c-fr-0008] The mobile terminal of claim 7, wherein the controller is further adapted to: display at least one graphic object (310) on the touch screen corresponding to at least one other terminal, respectively, belonging to the same home network as the mobile terminal, and transmit the new secure information to at least one other terminal. [9" id="c-fr-0009] The mobile terminal according to any one of claims 1 to 8, wherein the controller is further adapted to: edit guidance information to induce modification of the secure information, when the secure information has not been modified for a period of time predefined time. [10" id="c-fr-0010] The mobile terminal of any one of claims 1 to 9, wherein the controller is further adapted to: transmit the secure information to the object through a wireless communication processor (110). [11" id="c-fr-0011] The mobile terminal of any one of claims 1 to 10, wherein the controller is further adapted to: display a plurality of graphical objects corresponding to a plurality of authentication methods, respectively, as part of the execution of the authentication process, and perform a different authentication process depending on the chosen object among the plurality of graphic objects. [12" id="c-fr-0012] The mobile terminal of claim 11, wherein the plurality of authentication methods comprise at least one of the following methods: a fingerprint reading method, a facial recognition method, a speech recognition method, a method of password entry and a touch pattern input method. [13" id="c-fr-0013] 13. A method of controlling a mobile terminal, the method comprising: editing, via the touch screen of the mobile terminal, an overview received through the camera of the mobile terminal; executing, via the mobile terminal controller, an authentication process associated with an object in the preview and obtaining secure information for operating the object in the preview; and issuing secure information via the controller when the authentication process has been successfully executed based on the authentication information entered. [14" id="c-fr-0014] The method of claim 13, further comprising: storing, via a memory, associated information that associates objects with corresponding secure information; and executing, via the controller, the authentication process when the object includes related secure information associated with it in the memory. [15" id="c-fr-0015] The method of claim 14, further comprising: editing, via the controller, guidance information for inputting corresponding new secure information for the object image when the corresponding secure information is not in the memory for the purpose of the preview.
类似技术:
公开号 | 公开日 | 专利标题 FR3039294A1|2017-01-27|MOBILE TERMINAL AND METHOD OF CONTROLLING THE SAME RU2617393C2|2017-04-24|Method and device for file locking JP2021157837A|2021-10-07|Notification processing method, electronic device, computer readable storage medium, and program KR101659032B1|2016-09-23|Mobile terminal and control method thereof US9286482B1|2016-03-15|Privacy control based on user recognition US9723222B2|2017-08-01|Mobile terminal with a camera and method for capturing an image by the mobile terminal in self-photography mode KR101688168B1|2016-12-20|Mobile terminal and method for controlling the same US20170134553A1|2017-05-11|Mobile terminal and method for controlling the same EP2999128B1|2018-10-24|Mobile terminal and control method therefor FR3021767A1|2015-12-04|MOBILE TERMINAL AND METHOD FOR CONTROLLING THE SAME US9904774B2|2018-02-27|Method and device for locking file KR20150080736A|2015-07-10|Method for executing a function and Electronic device using the same US9692868B2|2017-06-27|Mobile terminal and control method for the mobile terminal US9826143B2|2017-11-21|Mobile terminal and control method thereof CN104778416B|2018-03-27|A kind of information concealing method and terminal CN107017996B|2021-09-21|Identity authentication method, device, equipment and storage medium FR3021136A1|2015-11-20|MOBILE TERMINAL AND METHOD OF CONTROLLING THE SAME CN103699825A|2014-04-02|Display apparatus and method for operating the same FR3040221A1|2017-02-24| FR3029309A1|2016-06-03| US10187511B2|2019-01-22|Mobile terminal and control method therefor FR3040096A1|2017-02-17|MOBILE TERMINAL AND METHOD OF CONTROLLING THE SAME FR3028630A1|2016-05-20|MOBILE TERMINAL AND METHOD FOR CONTROLLING THE SAME US9183372B2|2015-11-10|Mobile terminal and control method thereof US20170003772A1|2017-01-05|Mobile terminal and method for controlling the same
同族专利:
公开号 | 公开日 FR3039294B1|2020-05-01| KR20170011617A|2017-02-02| CN106372479A|2017-02-01| US20170026831A1|2017-01-26| US9877192B2|2018-01-23| EP3122018A1|2017-01-25| EP3122018B1|2019-10-09|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US8855300B2|2010-09-30|2014-10-07|Google Inc.|Image-based key exchange| CN102281539B|2011-08-29|2014-10-29|惠州Tcl移动通信有限公司|Mobile terminal and application program login method thereof| KR102001913B1|2012-09-27|2019-07-19|엘지전자 주식회사|Mobile Terminal and Operating Method for the Same| CN203070401U|2012-12-30|2013-07-17|章玺|Electronic lock system utilizing bar code| CN103902147A|2012-12-31|2014-07-02|腾讯科技(深圳)有限公司|Method and device for opening application program| KR101545904B1|2013-08-08|2015-08-20|삼성전자주식회사|Image display apparatus, and method for operating the same| CN103631503B|2013-11-15|2017-12-22|北京智谷睿拓技术服务有限公司|Information interacting method and information interactive device|CN106302330B|2015-05-21|2021-01-05|腾讯科技(深圳)有限公司|Identity verification method, device and system| US10667134B2|2016-11-21|2020-05-26|International Business Machines Corporation|Touch-share credential management on multiple devices| CN107403496A|2017-08-04|2017-11-28|四川长虹电器股份有限公司|Recognition of face intelligent lock system and recognition of face control method based on mobile device| US20190066415A1|2017-08-28|2019-02-28|Timetec Holding Sdn Bhd|Mobile-based access control system| JP2019049900A|2017-09-11|2019-03-28|富士ゼロックス株式会社|Information processing apparatus and program| JP2019067025A|2017-09-29|2019-04-25|京セラドキュメントソリューションズ株式会社|Image forming apparatus| CN109118617B|2018-07-13|2021-02-09|河南腾龙信息工程有限公司|Access control system applied to transformer substation and identification method thereof| CN112825013A|2019-11-20|2021-05-21|百度在线网络技术(北京)有限公司|Control method and device of terminal equipment|
法律状态:
2017-06-28| PLFP| Fee payment|Year of fee payment: 2 | 2018-06-01| PLSC| Search report ready|Effective date: 20180601 | 2018-06-22| PLFP| Fee payment|Year of fee payment: 3 | 2019-04-19| PLFP| Fee payment|Year of fee payment: 4 | 2020-05-27| PLFP| Fee payment|Year of fee payment: 5 | 2021-05-06| PLFP| Fee payment|Year of fee payment: 6 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 KR1020150104516A|KR20170011617A|2015-07-23|2015-07-23|Mobile terminal and control method for the mobile terminal| KR1020150104516|2015-07-23| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|