METHOD AND APPARATUS FOR PROVIDING SECURITY FUNCTION
First Claim
1. A method comprising:
- obtaining a request for executing a function of application through an electronic device if the electronic device is located within a predetermined distance from a user;
identifying success or failure of a first authentication which is previously performed for the user, in response to the request; and
determining whether to perform a second authentication for executing the function of the application based on the success or failure of the first authentication,wherein determining whether to perform the second authentication comprises performing the second authentication by using a security level lower than a security level related to the first authentication if the success of the first authentication is identified.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing a security function includes obtaining a request for executing a function of application through an electronic device if the electronic device is located within a predetermined distance from a user, identifying a success or failure of a first authentication which is previously performed for the user in response to the request, and determining whether to perform a second authentication for executing the function of the application based on the success or failure of the first authentication, wherein determining whether to perform the second authentication comprises performing the second authentication by using a security level lower than a security level related to the first authentication if the success of the first authentication is identified. An electronic device includes a processor configured to determine a success or failure of a first authentication, and decide whether to perform a second authentication with a second security level for executing the function.
-
Citations
20 Claims
-
1. A method comprising:
-
obtaining a request for executing a function of application through an electronic device if the electronic device is located within a predetermined distance from a user; identifying success or failure of a first authentication which is previously performed for the user, in response to the request; and determining whether to perform a second authentication for executing the function of the application based on the success or failure of the first authentication, wherein determining whether to perform the second authentication comprises performing the second authentication by using a security level lower than a security level related to the first authentication if the success of the first authentication is identified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An electronic device comprising:
-
a processor configured to; obtain a request for executing a function of application through the electronic device, if the electronic device is located within a predetermined distance from a user; identify a success or failure of a first authentication which is previously performed for the user, in response to the request; and determine whether to perform a second authentication for executing the function based on the success or failure of the first authentication, wherein the processor is configured to perform the second authentication by using a security level lower than a security level related to the first authentication when the success of the first authentication is identified. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification