Method and apparatus for providing security function
First Claim
1. A method comprising:
- detecting a request for executing a function of an application through an electronic device if the electronic device is located within a predetermined distance from a user;
identifying success or failure of a first authentication performed before the detection of the request, in response to the request; and
determining a security level related to a second authentication for the executing the function of the application based on the success or failure of the first authentication, andperforming the second authentication using the determined security level,wherein determining the security level related to the second authentication comprises;
changing the security level related to the second authentication to a security level lower than a security level related to the first authentication if the success of the first authentication is identified; and
changing the security level related to the second authentication to a security level higher than the security level related to the first authentication if the failure of the first authentication is identified.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing a security function includes obtaining a request for executing a function of application through an electronic device if the electronic device is located within a predetermined distance from a user, identifying a success or failure of a first authentication which is previously performed for the user in response to the request, and determining whether to perform a second authentication for executing the function of the application based on the success or failure of the first authentication, wherein determining whether to perform the second authentication comprises performing the second authentication by using a security level lower than a security level related to the first authentication if the success of the first authentication is identified. An electronic device includes a processor configured to determine a success or failure of a first authentication, and decide whether to perform a second authentication with a second security level for executing the function.
21 Citations
18 Claims
-
1. A method comprising:
-
detecting a request for executing a function of an application through an electronic device if the electronic device is located within a predetermined distance from a user; identifying success or failure of a first authentication performed before the detection of the request, in response to the request; and determining a security level related to a second authentication for the executing the function of the application based on the success or failure of the first authentication, and performing the second authentication using the determined security level, wherein determining the security level related to the second authentication comprises; changing the security level related to the second authentication to a security level lower than a security level related to the first authentication if the success of the first authentication is identified; and changing the security level related to the second authentication to a security level higher than the security level related to the first authentication if the failure of the first authentication is identified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An electronic device comprising:
-
a processor configured to; detect a request for executing a function of an application through the electronic device, if the electronic device is located within a predetermined distance from a user; identify a success or failure of a first authentication performed before the detection of the request in response to the request; determine a security level related to a second authentication for the executing the function of the application based on the success or failure of the first authentication; and perform the second authentication using the determined security level, wherein the processor is further configured to; change the security level related to the second authentication to a security level lower than a security level related to the first authentication if the success of the first authentication is identified; and change the security level related to the second authentication to a security level higher than the security level related to the first authentication if the failure of the first authentication is identified. - View Dependent Claims (15, 16, 17, 18)
-
Specification