Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. user inputs are received to set passwords for respective user levels, where each user level is associated with a different authority to access applications. The passwords are registered for the respective user levels. At least one application is associated with one of the user levels.
|
0. 21. An electronic device comprising:
a touchscreen;
a processor; and
a memory storing a plurality of executable instructions, wherein execution of the instructions by the processor causes performance of a plurality of operations comprising:
in a first mode of the electronic device:
controlling to display a first screen for inputting a password on the touchscreen;
determining whether a pattern password entered by a user through the first screen corresponds to a first pattern password corresponding to a second mode; and
entering the second mode, if the pattern password entered by the user through the first screen corresponds to the first pattern password,
in the second mode of the electronic device after receiving an input on a screen for increasing the number of levels, wherein the second mode is associated with a highest user level:
(i) controlling to display a second screen for setting a pattern password on the touchscreen of the electronic device;
(ii) changing the first pattern password corresponding to the second mode through the second screen, wherein the first pattern password is a pattern password for entering the second mode;
(iii) controlling to display a third screen for displaying representations corresponding to a plurality of applications stored in the memory, for setting a plurality of applications executable in a user level lower than the highest level among the plurality of applications; and
(iv) setting a plurality of first applications selected via a user input from among the plurality of applications stored in the memory through the third screen, as a plurality of applications executable in the user level lower than the highest user level;
wherein the third screen for setting the plurality of first applications is inaccessible in the first mode; and
wherein the memory stores at least one other pattern password associated with the user level lower than the highest user level.
1. A method of operation in an electronic device, the method comprising:
in a second mode of the electronic device after receiving an input on a screen for increasing the number of levels, wherein the second mode is associated with a highest user level:
(i) displaying a first screen for setting a pattern password on a touch screen of the electronic device, wherein the pattern password is associated with a user level lower than the highest user level;
(ii) setting a first pattern password corresponding to a first mode through the first screen, wherein the first pattern password is a password for entering the first mode from a lock state of the electronic device;
(iii) displaying a second screen for displaying representations corresponding to a plurality of applications stored in the electronic device, for setting a plurality of applications executable in the first mode among the plurality of applications; and
(iv) setting a plurality of first applications selected via a user input from among the plurality of applications stored in the electronic device through the second screen, as the plurality of applications executable in the first mode;
displaying a third screen for inputting a pattern password on the touch screen, in the lock state;
determining whether a pattern password entered by a user through the third screen corresponds to the first pattern password among a plurality of pattern passwords stored in the electronic device;
releasing the lock state and entering the first mode, if the pattern password entered in the lock state corresponds to the first pattern password; and
upon entering the first mode, displaying a plurality of icons for executing applications corresponding to the plurality of first applications on the touch screen and displaying at least one image indicating a restriction of usage corresponding to at least one application from among the plurality of applications in response to entering the first mode; and
wherein said (iv) setting the plurality of first applications is disabled in the first mode.
20. An electronic device comprising:
a touch screen;
a memory configured to store a plurality of applications and a plurality of pattern passwords; and
a processor configured to control operations of:; and
memory configured to store a plurality of applications and a plurality of pattern passwords, and storing a plurality of executable instructions, wherein execution of the plurality of instructions causes performance of a plurality of operations comprising:
in a second mode of the electronic device after receiving an input on a screen for increasing a number of levels, wherein the second mode is associated with a highest user level:
(i) displaying a first screen for setting a pattern password on the touch screen;
(ii) setting a first pattern password corresponding to a first mode through the first screen, wherein the first pattern password is a password for entering the first mode from a lock state of the electronic device, wherein the first pattern is associated with a user level lower than the highest user level;
(iii) displaying a second screen for displaying representations corresponding to the plurality of applications stored in the memory, for setting a plurality of applications executable in the first mode among the plurality of applications; and
(iv) setting a plurality of first applications selected by a user input from among the plurality of applications stored in the memory through the second screen, as the plurality of applications executable in the first mode;
displaying a third screen for inputting a pattern password on the touch screen in the lock state;
determining whether a pattern password entered by a user through the third screen corresponds to the first pattern password among a plurality of pattern passwords stored in the memory;
releasing the lock state and entering the first mode, if the pattern password entered in the lock state corresponds to the first pattern password; and
displaying a plurality of icons for executing applications corresponding to the plurality of first applications on the touch screen and displaying at least one image indicating a restriction of usage superposed with another at least one icon, upon entering the first mode;
wherein said (ii) setting the first pattern password corresponding to the first mode is disabled in the first mode.
8. An electronic device comprising:
a touch screen;
a memory configured to store a plurality of applications and a plurality of pattern passwords; and
a processor configured to control operations of:; and
a memory configured to store a plurality of applications and a plurality of pattern passwords and a plurality of executable instructions, wherein execution of the plurality of executable instructions by the processor causes performance of a plurality of operations comprising:
in a second mode of the electronic device after receiving an input on a screen for increasing a number of levels, wherein the second mode is associated with a highest user level:
(i) displaying a first screen for setting a pattern password on the touch screen;
(ii) setting a first pattern password corresponding to a first mode through the first screen, wherein the first pattern password is a password for entering the first mode from a lock state of the electronic device, wherein the first pattern password is associated with a user level lower than the highest user level;
(iii) displaying a second screen for displaying representations corresponding to the plurality of applications stored in the memory, for setting a plurality of applications executable in the first mode among the plurality of applications; and
iv) setting a plurality of first applications selected by a user input from among the plurality of applications stored in the memory through the second screen, as the plurality of applications executable in the first mode;
displaying a third screen for inputting a pattern password on the touch screen in the lock state;
determining whether a pattern password entered by a user through the third screen corresponds to the first pattern password among a plurality of pattern passwords stored in the memory;
releasing the lock state and entering the first mode, if the pattern password entered in the lock state corresponds to the first pattern password; and
displaying a plurality of icons for executing applications corresponding to the plurality of first applications on the touch screen and displaying at least one image indicating a restriction of usage superposed with another at least one icon, upon entering the first mode;
wherein said (iv) setting the plurality of first applications is disabled in the first mode.
2. The method of
setting a second pattern password corresponding to the second mode through the first screen, wherein the second pattern password is a password for entering the second mode from the lock state;
determining whether a pattern password entered by the user through the third screen corresponds to the second pattern password among the plurality of pattern passwords stored in the electronic device;
releasing the lock state and entering the second mode, if the pattern password entered in the lock screen state corresponds to the second pattern password; and
upon entering the second mode, displaying both the plurality of icons for executing applications corresponding to the plurality of first applications and at least one further icon for executing at least one application that is not selected via the user input as the plurality of applications executable in the first mode, on the touch screen.
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
9. The electronic device of
set a second pattern password corresponding to the second mode through the first screen, wherein the second pattern password is a password for entering the second mode from the lock state;
determine whether a pattern password entered by the user through the third screen corresponds to the second pattern password among the plurality of pattern passwords stored in the memory;
release the lock state and entering the second mode, if the pattern password entered in the lock screen state corresponds to the second pattern password; and
control displaying both the plurality of icons for executing applications corresponding to the plurality of first applications and at least one further icon for executing at least one application that is not selected via the user input as the plurality of applications executable in the first mode on the touch screen, upon entering the second mode.
10. The electronic device of
11. The electronic device of
12. The electronic device of
13. The electronic device of
14. The electronic device of
15. The electronic device of
16. The electronic device of
17. The electronic device of
0. 18. The electronic device of
19. The electronic device of
0. 22. The electronic device of claim 21, wherein the plurality of operations further comprises:
controlling to display a fourth screen for inputting a password on the touchscreen, in a lock state;
determining whether a pattern password entered by a user through the fourth screen corresponds to the first password corresponding to the second mode;
releasing the lock state and enter the second mode, if the pattern password entered in the lock state corresponds to the first password; and
upon entering the second mode, controlling to display, on the touch screen, a plurality of icons for executing applications corresponding to the plurality of applications stored in the memory.
0. 23. The electronic device of claim 21, wherein the plurality of first applications is executable in the highest user level.
0. 24. The electronic device of claim 21, wherein the plurality of operations comprises:
in the second mode of the electronic device:
(v) setting a plurality of second applications among the plurality of applications in an intermediate user level that is higher than the user level and lower than the highest user level, wherein the plurality of first applications and the plurality of second applications are executable at the intermediate user level, and wherein the plurality of second applications is not accessible at the user level.
|
The present application is a Continuation of U.S. patent application Ser. No. 14/580,552 filed on Dec. 23, 2014 which claims the benefit of the earlier U.S. patent application Ser. No. 14/044,210 filed on Oct. 2, 2013 and assigned U.S. Pat. No. 8,943,609 issued on Jan. 27, 2015 which claims the priority under 35 U.S.C. §119(a) to Korean Application Serial No. 10-2013-0023451, which was filed in the Korean Intellectual Property Office on Mar. 5, 2013, the entire content of which are hereby incorporated by reference. This application is a reissue application of U.S. Pat. No. 9,600,650 issued on Mar. 21, 2017 from U.S. patent application Ser. No. 14/982,238 filed on Dec. 29, 2015 which is a continuation of U.S. patent application Ser. No. 14/580,552 filed on Dec. 23, 2014 which issued as U.S. Pat. No. 9,230,079 on Jan. 5, 2016 which claims the benefit of the U.S. patent application Ser. No. 14/044,210 filed on Oct. 2, 2013 which issued as U.S. Pat. No. 8,943,609 on Jan. 27, 2015 which claims priority under 35 U.S.C. § 119(a) to Korean Application Serial No. 10-2013-0023451, filed in the Korean Intellectual Property Office on Mar. 5, 2013, the content of each of which are hereby incorporated by reference.
The present disclosure relates generally to configuring a password and releasing a lock using the configured password in an electronic device.
With recent advances in information and communication technologies, many kinds of portable electronic devices such as smart phones and tablet PCs have proliferated. Various applications for SNS, games, photography, etc. have been implemented in a typical device.
Generally, devices such as smart phones and the like have employed a screen lock function. The term “screen lock” refers to a locked screen condition in which only predetermined information is displayed without the performance of most functions. A screen lock occurs after the passage of predetermined time following no detected user input to the device when no applications are running that normally prevent the screen lock from occurring (such as a broadcast reception application). The screen lock function restricts telephony and prevents the exposure of a user's personal information including pictures, a list of text message trans- missions, and the like.
Conventionally, if a password protection is set up for the device, a method for releasing the screen lock requires the input of a predetermined password such as a pattern of numbers or touch patterns. That is, when the correct password is input, a device releases the screen lock and enables a user to use various applications which are executable in the device.
A problem arises, however, in a situation where the device is shared by multiple users. That is, when all users have authority to use all applications available in the device, personal information of each user is exposed to other users. Further, when parents and children use the device together, there is a problem in that inappropriate information might be inadvertently viewable by young children.
Disclosed herein is a method for configuring authority in an electronic device to use at least one application differently for a plurality of users.
In one aspect, a method of configuring a password in an electronic device is provided. User inputs are received to set passwords for respective user levels, where each user level is associated with a different authority to access applications. The passwords are registered for the respective user levels. At least one application is associated with one of the user levels.
In another aspect, a method of releasing a lock in an electronic device is provided. The method includes: receiving an input password for releasing the lock; comparing the input password with configured passwords for a plurality of user levels associated with different authority for at least one application; and releasing the lock in consideration of a user level for the input password when the input password matches any one of the configured passwords.
Apparatus for implementing the methods are also described.
Implementations may have the advantage of preventing certain users from accessing inappropriate information and contents.
The above and other aspects, features, and advantages of the present invention will be more apparent from the following detailed description taken in conjunction with the accompanying drawings, in which:
Hereinafter, various embodiments of the present invention will be described with reference to the accompanying drawings. In the following description, a detailed description of known functions and configurations incorporated herein will be omitted to avoid obscuring the subject matter of the present invention.
As described above, a method for releasing a lock according to the conventional art has a disadvantage in that private information on a certain person may be exposed to others, or inappropriate contents may be obtainable by a certain person when plural users use a device.
The present invention addresses these problems by providing a scheme in which a plurality of user levels are configured in order to permit each user to access applications depending on his/her level, thereby preventing private information and inappropriate contents from being exposed to others.
An electronic device (“device”) in embodiments described herein can be a portable information or communication device such as a smart phone, a tablet PC, a cell phone, an e-book, a camera, a game player, a music player, an Internet device or any other processing device with a display. The electronic device can also be a fixed device, such as a display device integrated with a home appliance.
Referring to
Next, in step 103a, upon receiving different user inputs for setting passwords at each user level, the device proceeds to step 105b. In one embodiment, each password may be settable in a form of numerals or a pattern or combination of thereof.
In step 105a, the device registers the input password for each user level and the selected application for a corresponding user level. Such registered information is used when an operation of releasing a lock is executed later.
Accordingly, when passwords for different user levels of a common device are registered as just described, users assigned different levels have different authority from one another in order to access applications. Therefore, there is an advantage in that inappropriate information can be blocked from being provided to a certain user.
When the request is received, in step 203, the device receives a user input designating the number of user levels. Here, the device can provide the user with a guide screen so that the user inputs the number of the user levels. An example of the guide screen is shown in
It is noted that step 203 may be omitted according to a setting manner. For example, a device designer, a software developer, etc. can pre-set the number of the user levels as a default. In this case, the device may not prompt the user to input a number of user levels.
In step 205, the device provides the user with a guide screen so that the user sets detail specifications relating to each user level. That is, the device provides the user with the guide screen in order that the user selects available applications in each user level and sets a password relating to the corresponding user level. Examples of these screens will be described with reference to
In the screen examples
As shown in
Where the user selects a menu 302a in order to select available applications in a user level 1, the device can guide categories of applications to the user as shown in
Categories of the respective applications can be identified in various ways. For example, the device may analyze meta data of each application, thereby identifying a category of the corresponding application. As shown in
On the other hand, when the user selects a menu 304a (see
Returning to
Regarding the third condition above, i.e., the complexity criteria, this can be predefined, for example, on the basis of the number of grid points in a case of inputting a password in a pattern manner. For instance, a pattern crossing three grid points has a higher complexity than a pattern crossing two grid points. Further, in a case of inputting numerals as a password, the complexity criteria may be based on the number of numerals/characters to be input. For example, a password including three numerals has a higher complexity than a password including two numerals.
As a result of the determination of step 209, when it is determined that inappropriate details exist, the device proceeds to step 211 and provides a guide screen in order for the user to reset details relating to the corresponding user level.
For example, as shown in
If at step 209, the device determines that the inappropriate details do not exist, the process moves to step 213 so as to store the details input by the user.
As mentioned above, the selection of one or more applications for each user level by selecting predetermined categories has been described as an example. As shown in
Further, the method of inputting the password using a pattern has been described above. However, a password may be input by using numerals instead of patterns as shown in
As mentioned above, a method of setting the details for each user level according to an embodiment of the present invention has been described with reference to
According to another embodiment of the present invention, releasing a lock in consideration of a user level for a corresponding password means that a device displays all icons of applications stored therein but only enables a user to use applications registered in the user level for a corresponding password, or applications in that user level and lower rank user levels. For example, when the input password identifies a level 2 user, the device displays all icons of the applications stored therein as shown in
According to still another implementation, releasing the lock after password entry is implemented by displaying all icons of the applications stored in the device; however, icons of the applications registered in the user level for the corresponding password are displayed in a different state from that of icons of the remaining applications. For instance, applications that are unavailable due to the current user level being too low are displayed in a distinguishing manner. Examples of this approach are illustrated in
Further, in a case of only one application being registered in a user level for a corresponding password, after the correct password is entered, the application may be executed immediately. For example, when only one application, which belongs to a category of “web browser”, is registered in a user level 1 and a password input by a user in order to release a lock is matched with the user level 1, a device can execute the corresponding application immediately, as shown in
Methods of releasing the lock according to embodiments of the present invention have been described with reference to
When receiving a user request in step 501 for a change of the user levels, i.e. a request to change user levels for each application, a device proceeds to step 503 and receives a password input by the user.
The device identifies whether the password input by the user is matched with a top-rank user level in step 505. If not, user levels are not changeable and the device remains in a waiting mode for the correct top-rank password (indicated by flow line back to 505 query). If the input password is matched with the top-rank user level, the device proceeds to step 507 where the device enables the user, who belongs to the top-rank user level, to change the user level for each application.
The device provides a guide screen so that the user can change the user level for each application, in step 507. For example, the device can display a list of the applications registered in each user level, as shown in
Once the user is satisfied with the user level changes, the user can request that the changes be stored via suitable input command in step 509, whereupon the device finally stores the changes in step 511.
An embodiment in which only the user belonging to the top-rank user level changes the user level for each application, has been described with reference to
The embodiment of changing the user level for each application has been described with reference to
Referring to
Methods of changing various details related to the user level according to embodiments have been described with reference to
A device identifies whether an app is downloaded in step 701. If so, the device identifies a category of the downloaded app in step 703. Here, the category of the downloaded app can be identified in different ways. For example, the device analyzes meta data of the downloaded app, so as to identify the app's category. In another approach, as shown in
Returning to
The methods of setting passwords for plural user levels respectively and of releasing a lock have been described with reference to
Device includes a controller 910, an input unit 920, an output unit 930, a memory 940 and a communication unit 950.
Controller 910 controls the various operations described above in connection with
Controller 910 registers the input password for each user level and the selected application for the corresponding user level. In order to register the password and the application, the controller 910 can display a guide screen on the output unit 930 for the user to select and input the details for each user level, i.e. the password and the application.
Before the controller 910 enables the user to select at least one application to be used in each user level, on the other hand, it receives the number of the user levels through the input unit 920. Accordingly, the controller 910 displays the guide screen on the output unit 930 in order for the user to select the number of the user levels.
In cases that the complexity of the input password for any one user level is lower than that of a password for a low-rank user level, the complexity of the input password for any one user level is higher than that of a password for a high-rank user level, and the complexity of the input password for any one user level is identical to that of a password for another user level, the controller 910 receives a password for the corresponding user level input by the user again. Accordingly, the controller 910 displays the guide screen on the output 930 in order for the user to input a password for the corresponding user level again.
When at least one application is downloaded, the controller 910 identifies a category of the downloaded application and registers the downloaded application as an application to be used in a user level to which the identified category belongs. At this time, the controller 910 analyzes at least one of meta data and the download page of the corresponding application and a page linked to the download page of the corresponding application and identifies the category of the downloaded application.
Upon receiving a request for user level change of at least one application, the controller 910 registers the corresponding application as an application to be used in the user level which is requested to be changed. Accordingly, the controller 910 displays a guide screen on the output unit 930 in order for the user to change a user level for each application.
Upon receiving a request for deletion of one user level, the controller 910 registers the application registered in the corresponding user level as an application to be used in the lowest-rank user level among high-rank user levels of the user level which is requested to be deleted. Accordingly, the controller 910 displays a guide screen on the output unit 930 in order for the user to delete or add a user level.
In releasing a lock, the controller 910 receives a password to release the lock through the input unit 920, and compares the input password and the passwords stored in the memory 940. Then, the controller 910 releases the lock in consideration of a user level for the corresponding password where the input password is identical to any one of the stored passwords.
In releasing the lock, the controller 910 can command the displaying of icons of applications to be used in the user level corresponding to the input password on the output unit 930. Icons of applications to be unavailable in the corresponding user level can be displayed in a different state from the icons of the applications to be used in the corresponding user level. For example, the controller 910 commands the displaying of the icons of the applications to be unavailable in the corresponding user level in the different state from the icons of the applications to be used in the corresponding user level in any one manner of applying different opacities to the icons of the applications to be used in the corresponding user level and the icons of the applications to be unavailable in the corresponding user level, changing the icons of the unavailable applications to a predetermined image, and superposing the predetermined image over the icons of the unavailable applications.
Further, the controller 910 may not display the icons of the applications to be unavailable in the corresponding user level.
On the other hand, where only one application is available in the user level corresponding to the password input by the user, the controller 910 may carry out an application immediately.
The input unit 920 transmits information input by the user to the controller 910.
The output unit 930 displays various guide screens under the control of the controller 910.
The input unit 920 and the output unit 930 preferably include a touch screen.
The memory 940 stores details for each user level.
The communication unit 950 communicates with external devices, preferably with the capability of using different communication mechanisms.
It will be appreciated that embodiments of the present invention may be implemented in the form of hardware, software, or a combination of hardware and software. Where the embodiment of the present invention may be implemented in a software, the software can be executed by one or more processors using various operating systems or platforms. In addition, the software can be programmed by using any one of a variety of suitable programming languages, and also can be compiled into assembly codes or intermediate codes which can be carried out in a framework or a virtual machine.
The above-described embodiments of the present disclosure can be implemented in hardware, firmware or via the execution of software or computer code that can be stored in a recording medium such as a CD ROM, a Digital Versatile Disc (DVD), a magnetic tape, a RAM, a floppy disk, a hard disk, or a magneto-optical disk or computer code down-loaded over a network originally stored on a remote recording medium or a non-transitory machine readable medium and to be stored on a local recording medium, so that the methods described herein can be rendered via such software that is stored on the recording medium using a general purpose computer, or a special processor or in programmable or dedicated hardware, such as an ASIC or FPGA. As would be understood in the art, the computer, the processor, microprocessor controller or the programmable hardware include memory components, e.g., RAM, ROM, Flash, etc. that may store or receive software or computer code that when accessed and executed by the computer, processor or hardware implement the processing methods described herein. In addition, it would be recognized that when a general purpose computer accesses code for implementing the processing shown herein, the execution of the code transforms the general purpose computer into a special purpose computer for executing the processing shown herein. Any of the functions and steps provided in the Figures may be implemented in hardware, software or a combination of both and may be performed in whole or in part within the programmed instructions of a computer. No claim element herein is to be construed under the provisions of 35 U.S.C. 112, sixth paragraph, unless the element is expressly recited using the phrase “means for”.
While the present invention has been shown and described with reference to certain embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the appended claims.
Patent | Priority | Assignee | Title |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 19 2019 | Samsung Electronics Co., Ltd. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Mar 19 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Aug 12 2024 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Mar 14 2026 | 4 years fee payment window open |
Sep 14 2026 | 6 months grace period start (w surcharge) |
Mar 14 2027 | patent expiry (for year 4) |
Mar 14 2029 | 2 years to revive unintentionally abandoned end. (for year 4) |
Mar 14 2030 | 8 years fee payment window open |
Sep 14 2030 | 6 months grace period start (w surcharge) |
Mar 14 2031 | patent expiry (for year 8) |
Mar 14 2033 | 2 years to revive unintentionally abandoned end. (for year 8) |
Mar 14 2034 | 12 years fee payment window open |
Sep 14 2034 | 6 months grace period start (w surcharge) |
Mar 14 2035 | patent expiry (for year 12) |
Mar 14 2037 | 2 years to revive unintentionally abandoned end. (for year 12) |