US10440032B2 - Method, apparatus, and recording medium for sharing use authority with respect to service - Google Patents
Method, apparatus, and recording medium for sharing use authority with respect to service Download PDFInfo
- Publication number
- US10440032B2 US10440032B2 US15/280,242 US201615280242A US10440032B2 US 10440032 B2 US10440032 B2 US 10440032B2 US 201615280242 A US201615280242 A US 201615280242A US 10440032 B2 US10440032 B2 US 10440032B2
- Authority
- US
- United States
- Prior art keywords
- user
- terminal
- service
- use authority
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000013475 authorization Methods 0.000 claims abstract description 140
- 238000004590 computer program Methods 0.000 claims 3
- 230000015654 memory Effects 0.000 description 38
- 230000005236 sound signal Effects 0.000 description 16
- 238000004891 communication Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 10
- 238000012545 processing Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000010897 surface acoustic wave method Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000005672 electromagnetic field Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000004091 panning Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
Definitions
- the present disclosure relates to a method and apparatus for sharing a use authority with respect to a service, and a non-transitory computer-readable recording medium having recorded thereon a program for executing the method of sharing a use authority with respect to a service.
- the Internet is evolving from a human-centered connection network in which people generate and use information to an Internet of Things (IoT) network in which information is exchanged and processed between distributed elements such as objects.
- IoT Internet of Things
- IoE Internet of Everything
- technical elements such as a sensing technique, wired and wireless communication and network infrastructure, a service interface technique, a security technique, etc. are required, and thus, recently, a sensor network for connection between objects, machine to machine (M2M) communication, machine-type communication (MTC), or the like are being studied.
- M2M machine to machine
- MTC machine-type communication
- an intelligent Internet Technology (IT) service to enhance everyday life may be provided by collecting and analyzing data generated in connected objects.
- IT Internet Technology
- the IoT converged and mixed with existing IT technologies in various industries may be applied to fields such as smart homes, smart buildings, smart cities, smart cars, connected cars, a smart grid, healthcare, smart appliances, high-tech medical services, disaster network communication, or the like.
- an aspect of the present disclosure is to provide a method and apparatus for sharing a use authority with respect to a service so as to increase convenience of use of a service by allowing the service allowed for a user of a terminal to be used by another user of another terminal.
- a method of an authorization server for sharing a use authority with respect to a service allowed for a user of a first terminal includes obtaining, from the first terminal, identifier information of at least one other user with whom the use authority is sharable and information about a validity period during which the use authority is shared with the at least one other user, when authentication information used in sharing the use authority with respect to the service is requested by a second terminal, determining whether or not a user of the second terminal is included among the at least one other user and when the user of the second terminal is included among the at least one other user, transmitting the requested authentication information to the second terminal.
- the method may further include receiving an authentication information request for the service from the second terminal, wherein the authentication information request includes identifier information of the user of the second terminal.
- the method may further include transmitting validity period information corresponding to the user of the second terminal to the second terminal.
- the method may further include classifying the identifier information of the at least one other user into a group according to the validity period, and storing the group.
- a method of a first terminal for sharing a use authority with respect to a service includes determining, based on an input by a user of the first terminal, at least one other user with whom the use authority with respect to the service allowed for the user is sharable and a validity period during which the use authority is shared with the at least one other user and transmitting identifier information of the at least one other user and information about the validity period to an authorization server, wherein, when a user of a second terminal which requests the authorization server for the use authority with respect to the service is included among the at least one other user, the second terminal obtains the use authority with respect to the service.
- the method may further include displaying a user interface for receiving an input of information of the at least one other user with whom the use authority with respect to the service is to be shared.
- the method may further include displaying information about at least one service allowed for the user of the first terminal and selecting one of the at least one service, based on an input by the user of the first terminal.
- a method of sharing a use authority with respect to a service allowed for a user of a first terminal includes requesting an authorization server for authentication information regarding the service, wherein the authorization server stores identifier information of at least one other user with whom the use authority with respect to the service is sharable and information about a validity period during which the use authority is shared with the at least one other user, when a user of the second terminal is included among the at least one other user, receiving the authentication information from the authorization server, and obtaining the use authority with respect to the service during the validity period set with respect to the user of the second terminal, based on the authentication information.
- the method may further include transmitting the authentication information to a service providing apparatus that provides the service.
- the method may further include receiving, from the authorization server, validity period information corresponding to the user of the second terminal.
- an authorization server for sharing a use authority with respect to a service allowed for a user of a first terminal includes a communicator configured to obtain, from the first terminal, identifier information of at least one other user with whom the use authority is sharable and information about a validity period during which the use authority is shared with the at least one other user and a controller configured to, when authentication information used in sharing the use authority with respect to the service is requested by a second terminal, determine whether or not a user of the second terminal is included among the at least one other user, and wherein, when the user of the second terminal is included among the at least one other user, the communicator is further configured to transmit the requested authentication information to the second terminal.
- the communicator may be further configured to receive an authentication information request for the service from the second terminal, wherein the authentication information request includes identifier information of the user of the second terminal.
- the communicator may be further configured to transmit validity period information corresponding to the user of the second terminal to the second terminal.
- the controller may be further configured to classify the identifier information of the at least one other user into a group according to the validity period, and to store the group.
- a first terminal for sharing a use authority with respect to a service includes a controller configured to determine, based on an input by a user of the first terminal, at least one other user with whom the use authority with respect to the service allowed for the user is sharable and a validity period during which the use authority is shared with the at least one other user and a communicator configured to transmit identifier information of the at least one other user and information about the validity period to an authorization server, wherein, when a user of a second terminal which requests the authorization server for the use authority with respect to the service is included among the at least one other user, the second terminal obtains the use authority with respect to the service.
- the first terminal may further include an output unit configured to, when user authentication information indicating the user of the first terminal is obtained, display a user interface for receiving an input of information of the at least one other user with whom the use authority with respect to the service is to be shared.
- the output unit may be further configured to display information about at least one service allowed for the user of the first terminal, and the controller may be further configured to select one of the at least one service, based on an input by the user of the first terminal.
- a second terminal for sharing a use authority with respect to a service allowed for a user of a first terminal.
- the second terminal includes a communicator configured to request an authorization server for authentication information regarding the service, wherein the authorization server stores identifier information of at least one other user with whom the use authority with respect to the service is sharable and information about a validity period during which the use authority is shared with the at least one other user, and to receive the authentication information from the authorization server when a user of the second terminal is included among the at least one other user and a controller configured to obtain the use authority with respect to the service during the validity period set with respect to the user of the second terminal, based on the authentication information.
- the communicator may be further configured to transmit the authentication information to a service providing apparatus that provides the service.
- the communicator may be further configured to receive, from the authorization server, validity period information corresponding to the user of the second terminal.
- FIG. 1 illustrates a system for sharing a use authority with respect to a service according to an embodiment of the present disclosure
- FIG. 2 is a flowchart of a method of sharing a use authority with respect to a service according to an embodiment of the present disclosure
- FIG. 3 is a flowchart of a method of sharing a use authority with respect to a service according to an embodiment of the present disclosure
- FIG. 4 illustrates a screen of a first terminal which is related to a method of requesting a user of the first terminal to input user authentication information according to an embodiment of the present disclosure
- FIG. 5 illustrates a screen of a first terminal which is related to a method of providing a user interface for selecting a service with respect to which use authority is shared with another user according to an embodiment of the present disclosure
- FIG. 6 illustrates a screen of a first terminal which is related to a method of providing a user interface for selecting another user with whom a use authority with respect to a service that is allowed for a user of the first terminal is to be shared according to an embodiment of the present disclosure
- FIG. 7 illustrates a user interface for setting a validity period during which a use authority with respect to a service that is allowed for a user is shared with at least one other user according to an embodiment of the present disclosure
- FIG. 8 is a flowchart of a method of setting a use authority with respect to a service so as to allow the use authority with respect to the service that is allowed for a user of a first terminal to be shared with a user of a second terminal according to an embodiment of the present disclosure
- FIG. 9 is a flowchart of a method of sharing a use authority with respect to a service of a user of a first terminal according to an embodiment of the present disclosure
- FIG. 10 illustrates a screen of a second terminal which is related to a method of providing a user interface for selecting a service with respect to which use authority is shared with another user according to an embodiment of the present disclosure
- FIG. 11 illustrates a user interface that is displayed when a second terminal requests a user of a first terminal to share a use authority with respect to a service that is allowed for the user of the first terminal according to an embodiment of the present disclosure
- FIG. 12 illustrates a user interface that displays detailed information about a use authority with respect to a service which is shared with a user of a second terminal according to an embodiment of the present disclosure
- FIG. 13 illustrates a screen of a second terminal which is related to a method of receiving a Wireless Fidelity (Wi-Fi) service based on authentication information received by the second terminal according to an embodiment of the present disclosure
- Wi-Fi Wireless Fidelity
- FIG. 14 illustrates a screen of a second terminal which is related to a method of receiving a door-lock unlock service based on authentication information received by the second terminal according to an embodiment of the present disclosure
- FIG. 15 is a flowchart of a method of sharing a use authority with respect to a service among a first terminal, an authorization server, and a second terminal in a use authority system according to an embodiment of the present disclosure
- FIG. 16 is a flowchart of a method of sharing a use authority with respect to a service among a first terminal, an authorization server, and a second terminal in a use authority system according to an embodiment of the present disclosure
- FIGS. 17 and 18 illustrate block diagrams of a first terminal according to various embodiments of the present disclosure
- FIG. 19 is a block diagram of an authorization server according to an embodiment of the present disclosure.
- FIGS. 20 and 21 are block diagrams of a second terminal according to various embodiments of the present disclosure.
- a part includes or “comprises” an element, unless there is a particular description contrary thereto, the part can further include other elements, not excluding the other elements.
- terms such as “unit” and “module” indicate a unit for processing at least one function or operation, wherein the unit and the block may be embodied as hardware or software or embodied by combining hardware and software.
- the term “and/or” includes any and all combinations of one or more of the associated listed items. Expressions such as “at least one of,” when preceding a list of elements, modify the entire list of elements and do not modify the individual elements of the list.
- FIG. 1 illustrates a system for sharing a use authority with respect to a service according to an embodiment of the present disclosure.
- a use authority sharing system 10 may include a first terminal 100 , second terminal 300 , and an authorization server 200 .
- FIG. 1 illustrates the use authority sharing system 10 only including elements related to the present embodiment. However, it is obvious to one of ordinary skill in the art that the use authority sharing system 10 may further include general-use elements as well as the elements shown in FIG. 1 .
- a user of the first terminal 100 may receive, via the first terminal 100 , a service provided by a service providing server 5 .
- the service may be provided only to a terminal that obtained a use authority.
- the service may include a Wireless Fidelity (Wi-Fi) connection service, a door-lock unlock service, a bank account access service, and a website access service, and the technical concept of the disclosure is not limited thereto.
- Wi-Fi Wireless Fidelity
- the first terminal 100 may transmit, to the service providing server 5 , user authentication information including an identifier and password that are pre-registered in the service providing server 5 , and thus may obtain the use authority with respect to receiving the service.
- the first terminal 100 may share the use authority with respect to the service with another user via the authorization server 200 .
- the first terminal 100 may determine the other user with whom the use authority with respect to the service is shared, based on an input of the user of the first terminal 100 .
- the first terminal 100 may include, but is not limited to, a mobile phone, a smartphone, a wearable device, a laptop computer, and a tablet personal computer (PC).
- the authorization server 200 may obtain information of at least one other user with whom the use authority with respect to the service allowed for the user of the first terminal 100 may be shared. Also, the authorization server 200 may obtain information regarding a validity period during which the use authority with respect to the service may be shared with the at least one other user. The information of the at least one other user with whom the use authority with respect to the service is sharable, and the information regarding the validity period during which the use authority with respect to the service is shared may be stored in the authorization server 200 .
- the authorization server 200 may receive, from the second terminal 300 , a request for authentication information used in sharing the service allowed for the user of the first terminal 100 . Based on identifier information of a user of the second terminal 300 which is included in the request for authentication information from the second terminal 300 , the authorization server 200 may determine if the user of the second terminal 300 is included in the at least one other user with whom the use authority with respect to the service is shared. When the user of the second terminal 300 is included in the at least one other user, the authorization server 200 may transmit the authentication information for obtaining the use authority with respect to the service to the second terminal 300 .
- the authentication information provided for sharing of the service may be different from user authentication information assigned to a user.
- the authentication information may include an access token, or the like.
- the authentication information provided for sharing of the service may be equal to the user authentication information.
- the second terminal 300 may request the authorization server 200 for the authentication information used in sharing the use authority with respect to the service. Since information about the user of the second terminal 300 is included in the information of the at least one other user with whom the use authority with respect to the service is shared, the information of the at least one other user being stored in the authorization server 200 , the second terminal 300 may receive the authentication information from the authorization server 200 .
- the second terminal 300 may transmit, to the service providing server 5 , the authentication information received from the authorization server 200 , and thus may obtain the use authority with respect to receiving the service.
- the second terminal 300 may obtain the use authority with respect to receiving the service for a preset validity period from the authorization server 200 .
- the second terminal 300 may include, but is not limited to, a mobile phone, a smartphone, a wearable device, a laptop computer, and a tablet PC.
- FIG. 2 is a flowchart for describing a method of sharing a use authority with respect to a service according to an embodiment of the present disclosure.
- the first terminal 100 determines, based on an input by a user of the first terminal 100 , at least one other user with whom the use authority with respect to the service is sharable, and a validity period during which the use authority with respect to the service is shared with the at least one other user.
- the user of the first terminal 100 may be a user who obtained a use authority with respect to at least one service.
- the user of the first terminal 100 may be the user who joined a Wi-Fi service, and may obtain the use authority by transmitting user authentication information such as an identifier and password to a Wi-Fi service providing server.
- the user of the first terminal 100 may select at least one other user with whom the use authority with respect to the service is to be shared. For example, the user of the first terminal 100 may select the at least one other user with whom the use authority with respect to the service is to be shared, from among acquaintances of the user which are stored in a phonebook application, a social networking service (SNS) application, or the like that is executed in the first terminal 100 .
- a phonebook application e.g., a phonebook application
- SNS social networking service
- the first terminal 100 may determine the at least one other user, based on a user input for selecting the at least one other user, the user input received from the user of the first terminal 100 .
- the first terminal 100 may determine the validity period during which the use authority with respect to the service may be shared with the at least one other user.
- the validity period may be determined as a time period, the number of times, or a time duration, and the technical concept of the disclosure is not limited thereto.
- the first terminal 100 may set the validity period as every week during which the use authority with respect to the service may be shared with another user A.
- the first terminal 100 may set the validity period for three hours after a particular point of time during which the use authority with respect to the service may be shared with another user B.
- the first terminal 100 may set the validity period as three times by which the use authority with respect to the service may be shared with another user C.
- the plurality of pieces of identifier information of other terminals may include Internet Protocol (IP) information, or the like.
- IP Internet Protocol
- the first terminal 100 transmits information about at least one terminal and information about the validity period to an authorization server.
- the first terminal 100 may transmit, to the authorization server 200 , the information of the at least one other user with whom the use authority with respect to the service is shared.
- the information of the at least one other user may include an identifier, a password, a personal identification number (PIN), or the like of the at least one other user, and the technical concept of the disclosure is not limited thereto.
- the first terminal 100 may transmit, to the authorization server 200 , the information about the validity period during which the use authority with respect to the service is shared with the at least one other user.
- FIG. 3 is a flowchart of a method of sharing a use authority with respect to a service according to an embodiment of the present disclosure.
- the first terminal 100 may obtain user authentication information.
- a user of the first terminal 100 may request a user interface for inputting information of another user with whom the use authority with respect to the service is shared.
- the first terminal 100 may display a window for inputting the user authentication information.
- the user may input the user authentication information to the displayed window.
- the user authentication information may include an identifier, a password, or the like of the user of the first terminal 100 which are preset.
- the first terminal 100 may determine whether or not the obtained user authentication information corresponds to pre-stored user authentication information.
- the first terminal 100 may determine whether or not a pre-stored identifier and password of the user correspond to the obtained identifier and password of the user.
- the first terminal 100 may display a user interface for receiving an input for information of another user with whom the use authority with respect to the service is to be shared.
- the user interface may display information about at least one service that is allowed for the user of the first terminal 100 .
- the user interface may also display a plurality of pieces of identifier information of other users stored in the first terminal 100 .
- the user interface may display information about the group.
- the plurality of pieces of aforementioned information may be sequentially displayed when a user input is input to the user interface.
- the first terminal 100 may determine, based on an input by the user of the first terminal 100 , at least one other user with whom the use authority with respect to the service is sharable and a validity period during which the use authority with respect to the service is shared with the at least one other user.
- the operation S 340 may correspond to the operation S 210 described above with reference to FIG. 2 .
- the first terminal 100 may transmit information of the at least one other user and information about the validity period to the authorization server 200 .
- the operation S 350 may correspond to the operation S 220 described above with reference to FIG. 2 .
- FIG. 4 illustrates a screen of a first terminal which is related to a method of requesting a user of the first terminal to input user authentication information according to an embodiment of the present disclosure.
- the first terminal 400 may request an input for user authentication information.
- the first terminal 400 may display, on the screen, a user interface including a message window 410 for requesting the user authentication information.
- the user authentication information may be transmitted from the authorization server 200 to the first terminal 400 .
- the user authentication information may include an identifier, a password, and the like which are pre-registered in the authorization server 200 .
- the first terminal 400 may transmit the input user authentication information to the authorization server 200 .
- the authorization server 200 may store information about the other user with whom the use authority with respect to the service is to be shared.
- the first terminal 400 may display, on the screen, the user interface including the message window 410 for requesting the user authentication information.
- FIG. 5 illustrates a screen of a first terminal which is related to a method of providing a user interface for selecting a service with respect to which use authority is shared with another user according to an embodiment of the present disclosure.
- the list of the plurality of services 530 for which use authority is sharable with another user may be displayed on the screen of the first terminal 500 .
- the user of the first terminal 500 may select at least one service by touching a checkbox for the at least one service from the list of a plurality of services 530 .
- the at least one service selected by the user of the first terminal 500 may be stored. Afterward, the first terminal 500 may display a user interface for setting another user with whom a use authority with respect to the at least one service is to be shared and setting a validity period during which the use authority with respect to the at least one service is shared. This will be described at a later time with reference to FIGS. 6 and 7 .
- the user of the first terminal 500 may change pre-stored information about a use authority with respect to a shared service by touching an editing tab 540 included in the user interface.
- the first terminal 500 may display the message window 410 for requesting the user authentication information described with reference to FIG. 4 , and thus may prevent that information about the use authority with respect to the service is changed by another user who is not the user of the first terminal 500 .
- the first terminal 500 may share a use authority with respect to a service which is obtained by another user.
- the obtained use authority tab 520 is selected, information about a use authority with respect to a service that another user allows sharing with the user of the first terminal 500 may be displayed on a screen of the first terminal 500 .
- the first terminal 500 may operate to correspond to the second terminal 300 described with reference to FIG. 1 .
- FIG. 6 illustrates a screen of a first terminal which is related to a method of providing a user interface for selecting another user with whom a use authority with respect to a service that is allowed for a user of the first terminal is to be shared according to an embodiment of the present disclosure.
- the first terminal 600 may display a list 610 stored in the first terminal 600 and including a plurality of pieces of information about acquaintances of the user of the first terminal 600 .
- the plurality of pieces of information about acquaintances of the user of the first terminal 600 may include, but are not limited to, names, contact information, addresses, etc. of the acquaintances.
- a plurality of pieces of information about the acquaintances of the user of the first terminal 600 which are provided by a particular service may be classified into groups. For example, in a case of an SNS service, the acquaintances of the user of the first terminal 600 may be classified into a best friend group, a family group, a colleague group, and the like according to setting by the user of the first terminal 600 .
- the user of the first terminal 600 may select at least one of the groups set for a service, and may share a use authority with respect to the service.
- the user of the first terminal 600 may select the best friend group and may share a use authority so as to allow acquaintances included in the best friend group to use an account of the user in the SNS service.
- the user of the first terminal 600 may set a scope of a service with respect to which use authority is shared. For example, in the SNS service, a use authority of a service which is to be shared may be classified into an authority allowing another user to upload bulletins, instead of the user, an authority allowing the other user to edit bulletins of the user, or the like. The user of the first terminal 600 may select a particular use authority among classified use authorities of the service and may share the particular use authority with acquaintances in a selected group.
- FIG. 7 illustrates a user interface for setting a validity period during which a use authority with respect to a service that is allowed for a user is shared with at least one other user according to an embodiment of the present disclosure.
- the first terminal 700 may share a use authority with respect to a Wi-Fi service with acquaintances included in a best friend group 710 registered in an SNS service.
- the first terminal 700 may display a user interface including a window for receiving an input for a validity period during which the use authority with respect to the Wi-Fi service is sharable.
- a window 720 for receiving an input for a time period, and a window 730 for receiving an input for a time duration and the number of times may be displayed on the user interface of the first terminal 700 .
- the user of the first terminal 700 may share the use authority with respect to the Wi-Fi service with the acquaintances included in the best friend group 710 registered in the SNS service, three times from Dec. 12, 2014 to Dec. 15, 2014 for two hours each time.
- a validity period during which a use authority with respect to a service is sharable between the user of the first terminal 700 and another user is not limited to a time period, a time duration, and the number of times.
- the user of the first terminal 700 may set the validity period during which the use authority with respect to the service is shared with the other user by setting at least one of the time period, the time duration, and the number of times.
- FIG. 8 is a flowchart of a method of setting a use authority with respect to a service so as to allow the use authority with respect to the service that is allowed for a user of a first terminal to be shared with a user of the second terminal according to an embodiment of the present disclosure.
- the authorization server 200 obtains, from the first terminal, information of at least one other user with whom the use authority with respect to the service is sharable, and information about a validity period during which the use authority with respect to the service is shared with the at least one other user.
- the authorization server 200 may receive a sharing request with respect to the use authority with respect to the service from the first terminal 100 . Therefore, the authorization server 200 may request the first terminal 100 for user authentication information. Since the user authentication information is requested by the authorization server 200 , the first terminal 100 may display a message window for requesting an input for the user authentication information on a screen of the first terminal 100 . When the user authentication information is input to the first terminal 100 , the first terminal 100 may transmit the input user authentication information to the authorization server 200 .
- the authorization server 200 may request the first terminal 100 for information required for the user of the first terminal 100 to share the use authority with respect to the service with the at least one other user.
- the first terminal 100 may display a user interface for receiving an input for the information.
- the information for sharing the use authority with respect to the service may include the information of the at least one other user with whom the use authority with respect to the service is to be shared by the user of the first terminal 100 , the information about the validity period during which the use authority with respect to the service is shared with the at least one other user, and the like.
- the user of the first terminal 100 may input, to the displayed user interface, the information of the at least one other user with whom the use authority with respect to the service is to be shared by the user of the first terminal 100 and the information about the validity period during which the use authority with respect to the service is shared with the at least one other user. Accordingly, the first terminal 100 may transmit the input information to the authorization server 200 .
- the authorization server 200 may determine whether or not a user of the second terminal 300 is included in the at least one other user.
- the authorization server 200 may receive, from the second terminal 300 , an authentication information request for requesting authentication information used in sharing the use authority with respect to the service.
- the authentication information request may include identifier information of a user of the second terminal 300 .
- the authentication information request may include an identifier, a password, and the like of the second terminal 300 .
- the authorization server 200 may check whether or not the user of the second terminal 300 is included in the at least one other user with whom the use authority with respect to the service is to be shared by the user of the first terminal 100 .
- the authorization server 200 may transmit the requested authentication information to the second terminal 300 .
- the authentication information according to the present embodiment may be different from the user authentication information registered by the user of the first terminal 100 so as to use the service.
- an access token, or the like may be used as the authentication information.
- the authorization server 200 may not transmit the user authentication information registered by the user of the first terminal 100 but may transmit the authentication information different from the user authentication information, so that the authorization server 200 may share the use authority with respect to the service of the user and may also increase security of the user authentication information.
- the disclosure is not limited to the present embodiment, and according to another embodiment, the user authentication information registered by the user of the first terminal 100 may be transmitted to the second terminal 300 .
- the authorization server 200 may transmit, to the second terminal 300 , the user authentication information registered by the user of the first terminal 100 .
- the user of the second terminal 300 may obtain the use authority with respect to the service during the validity period. Accordingly, the service may be provided to the second terminal 300 during the validity period, based on the use authority with respect to the service.
- FIG. 9 is a flowchart for describing a method of sharing a use authority with respect to a service of a user of a first terminal according to an embodiment of the present disclosure.
- the second terminal 300 requests authentication information for a service from the authorization server 200 that stores information of at least one other user with whom a use authority with respect to a service is sharable and information about a validity period during which the use authority with respect to the service is shared with the at least one other user.
- the second terminal 300 may transmit, to the authorization server 200 , an authentication information request for sharing the use authority with respect to the service that is allowed for a user of the first terminal 100 .
- the authentication information request may include identifier information of a user of the second terminal 300 .
- the second terminal 300 may transmit, to the authorization server 200 , the input identifier and password of the user of the second terminal 300 which are input with respect to the particular service.
- the second terminal 300 receives authentication information from the authorization server 200 .
- the second terminal 300 may receive the authentication information from the authorization server 200 .
- the authorization server 200 may previously store identifier information of the at least one other user for whom the user of the first terminal 100 authorized sharing the use authority with respect to the service.
- the second terminal 300 obtains the use authority with respect to the service during the validity period, based on the received authentication information.
- the second terminal 300 may transmit the received authentication information to a service providing apparatus that provides the service.
- the received authentication information may be deleted from the second terminal 300 when the validity period expires.
- the service providing apparatus may determine the received authentication information as invalid information.
- FIG. 10 illustrates a screen of a second terminal which is related to a method of providing a user interface for selecting a service with respect to which use authority is shared with another user according to an embodiment of the present disclosure.
- the second terminal 1000 may display a list 1030 of services for which sharing of use authorities is allowed for the user of the second terminal 1000 , by at least one other user.
- the user of the second terminal 1000 may select at least one service from among the services included in the list 1030 . For example, when a use tab displayed next to identifier information of the service is touched, the particular service may be selected in the second terminal 1000 .
- the second terminal 1000 may transmit an authentication information request with respect to the Wi-Fi service to the authorization server 200 .
- the authentication information request with respect to the Wi-Fi service may include identifier information of the user of the second terminal 1000 .
- the authorization server 200 may obtain the identifier information of the user of the second terminal 1000 which is included in the authentication information request received from the second terminal 1000 . Based on the obtained identifier information of the user of the second terminal 1000 , the authorization server 200 may determine whether or not the user of the second terminal 1000 is included in at least one other user for whom sharing of a use authority with respect to the Wi-Fi service is allowed by a user of the first terminal 100 .
- the second terminal 1000 may receive authentication information from the authorization server 200 .
- the second terminal 1000 may display a user interface for receiving an input for information for allowing a use authority with respect to a service to be shared with another user, wherein the use authority with respect to the service is allowed for the user of the second terminal 1000 .
- the second terminal 1000 may operate to correspond to the first terminal 100 described with reference to FIG. 1 .
- FIG. 11 illustrates a user interface that is displayed when a second terminal requests a user of a first terminal to share a use authority with respect to a service that is allowed for the user of the first terminal according to an embodiment of the present disclosure.
- a user of the second terminal 1100 may select the Wi-Fi service on the user interface described with reference to FIG. 10 . Accordingly, a user interface associated with sharing of a use authority with respect to the Wi-Fi service may be displayed on a screen of the second terminal 1100 .
- the user interface of the second terminal 1100 may include a use button 1110 for requesting execution of the Wi-Fi service, and a detailed information button 1120 for checking detailed information of a use authority shared with the user of the second terminal 1100 .
- the second terminal 1100 may transmit, to a Wi-Fi service providing apparatus, authentication information received from the authorization server 200 .
- the user interface of the second terminal 1100 may display information of the user of the first terminal 100 for which Wi-Fi service is allowed, and information about a validity period during which the use authority with respect to the Wi-Fi service is sharable with the second terminal 1100 . This will be described at a later time with reference to FIG. 12 .
- FIG. 12 illustrates a user interface that displays detailed information about a use authority with respect to a service which is shared with a user of a second terminal 1200 , according to an embodiment of the present disclosure.
- the second terminal 1200 may display detailed information about a use authority with respect to a Wi-Fi service which is allowed to be shared by a user of the first terminal 100 .
- the detailed information about the use authority with respect to the Wi-Fi service may include information 1210 of the user of the first terminal 100 and two pieces of validity period information 1220 and 1230 .
- the second terminal 1200 may display, on the user interface, information indicating that the use authority with respect to the Wi-Fi service that is allowed for Arif Billah Rubai who is the user of the first terminal 100 is shared. Also, the second terminal 1200 may display, on the user interface, information about a validity period during which the use authority with respect to the Wi-Fi service is sharable three times from Dec. 12, 2014 to Dec. 15, 2014 for two hours each time.
- FIG. 13 illustrates a screen of a second terminal which is related to a method of receiving a Wi-Fi service based on authentication information received by the second terminal according to an embodiment of the present disclosure.
- a user of the second terminal 1300 may select the Wi-Fi service from among at least one service displayed on a user interface of the second terminal 1300 .
- the Wi-Fi service is allowed for a user of the first terminal 100 and is not allowed for the user of the second terminal 1300 .
- the user of the second terminal 1300 may share a use authority that is allowed for the user of the first terminal 100 .
- the second terminal 1300 may request the authorization server 200 for authentication information with respect to the Wi-Fi service. Based on identifier information of the user of the second terminal 1300 which is included in the request for the authentication information received from the second terminal 1300 , the authorization server 200 may determine whether or not the user of the second terminal 1300 is included among at least one pre-stored user.
- information of the at least one pre-stored user may be transmitted from the first terminal 100 to the authorization server 200 and may be stored in a memory of the authorization server 200 .
- the authorization server 200 may transmit authentication information used in sharing a use authority with respect to the Wi-Fi service to the second terminal 1300 .
- the authentication information used in sharing the use authority with respect to the Wi-Fi service may include network service set identifier (SSID) information 1310 and a password 1320 .
- SSID network service set identifier
- the disclosure is not limited thereto, and thus, authentication information used in sharing a use authority with respect to a service may differ according to types of the service.
- FIG. 14 illustrates a screen of a second terminal which is related to a method of receiving a door-lock unlock service based on authentication information received by the second terminal according to an embodiment of the present disclosure.
- a user of the second terminal 1400 may select a door-lock unlock service from among at least one service displayed on a user interface of the second terminal 1400 .
- the door-lock unlock service is allowed for a user of the first terminal 100 and is not allowed for the user interface of the second terminal 1400 .
- a use authority with respect to a service that is allowed for the user of the first terminal 100 may be shared.
- the second terminal 1400 may transmit an authentication information request for the door-lock unlock service to the authorization server 200 .
- the authorization server 200 may determine whether or not the user of the second terminal 1400 is included among at least one pre-stored user, based on identifier information of the user of the second terminal 1400 which is included in the authentication information request received from the second terminal 1400 .
- information of the at least one pre-stored user may be transmitted from the first terminal 100 to the authorization server 200 and may be stored in a memory of the authorization server 200 .
- the authorization server 200 may transmit, to the second terminal 1400 , authentication information 1410 used in sharing a use authority with respect to the door-lock unlock service.
- the user of the second terminal 1400 may tag the second terminal 1400 to a door-lock system and may unlock a door-lock.
- FIG. 15 is a flowchart for describing a method of sharing a use authority with respect to a service among a first terminal, an authorization server, and a second terminal in a use authority system according to an embodiment of the present disclosure.
- the first terminal may transmit, to the authorization server, information of at least one other user with whom a use authority with respect to a service that is allowed for a user of the first terminal is shared and information about a validity period during which the use authority with respect to the service is shared with the at least one other user.
- the authorization server may store the information of the at least one other user with whom the use authority with respect to the service that is allowed for the user of the first terminal is shared and the information about the validity period during which the use authority with respect to the service is shared with the at least one other user, wherein the two pieces of information are received from the first terminal.
- the second terminal may request the authorization server for authentication information used in sharing the use authority with respect to the service that is allowed for the user of the first terminal.
- the authorization server may determine whether or not a user of the second terminal is included in the at least one other user.
- the authorization server may determine whether or not the user of the second terminal is included in the at least one other user, based on the pre-stored information of the at least one other user with whom the use authority with respect to the service that is allowed for the user of the first terminal is sharable.
- the authorization server may transmit the authentication information regarding the service to the second terminal.
- the authorization server may transmit the authentication information regarding the service to the second terminal.
- the second terminal may obtain the use authority with respect to the service during the validity period.
- the second terminal according to the present embodiment may receive the service by sharing the use authority with respect to the service during the validity period that is allowed by the user of the first terminal.
- FIG. 16 is a flowchart for describing a method of sharing a use authority with respect to a service among a first terminal, an authorization server, and a second terminal in a use authority system according to an embodiment of the present disclosure.
- the second terminal may request the authorization server for sharing of a use authority with respect to a service of the first terminal.
- the request for sharing the use authority may include an identifier and password of the second terminal which are registered in the authorization server.
- the authorization server may transmit a response message with respect to the request for sharing the use authority to the second terminal.
- the response message may include an authentication code input window for receiving an input for an authentication code for verifying that a user of the second terminal is a user who is registered in the authorization server.
- a PIN code may be used as the authentication code for verifying that the user of the second terminal is the user who is registered in the authorization server.
- the second terminal may request the authorization server for an authorization code. For example, when the user of the second terminal inputs the authentication code to the authentication code input window that is displayed when the second terminal receives the response message from the authorization server, the second terminal may transmit an authorization code request message including the input authentication code.
- the authorization server may transmit, to the first terminal, an agreement check message with respect to whether or not the use authority with respect to the service is allowed for the user of the second terminal.
- the first terminal when the first terminal obtains, from a user of the first terminal, an input for allowing sharing of the use authority with respect to the service for the user of the second terminal, the first terminal may transmit, to the authorization server, an agreement message indicating that the use authority with respect to the service is allowed for the user of the second terminal.
- the authorization server may transmit the authorization code to the second terminal.
- the second terminal may transmit, to the authorization server, an authentication information request including the received authorization code, identification information about the service with respect to which use authority is to be shared, or the like.
- the authorization server may transmit authentication information to the second terminal.
- the second terminal may obtain the use authority with respect to the service that is allowed for the user of the first terminal, by using the received authentication information.
- FIGS. 17 and 18 illustrate block diagrams of a first terminal according to various embodiments of the present disclosure.
- the first terminal 100 may include a communicator 110 and a controller 120 (also referred to as a processor 120 ). However, not all shown elements are necessary elements. That is, the first terminal 100 may be embodied with more elements than the shown elements or may be embodied with fewer elements than the shown elements.
- the first terminal 100 may further include an output unit 130 , a user input unit 140 , a sensing unit 150 , an audio/video (A/V) input unit 160 , and a memory 170 , in addition to the communicator 110 and the controller 120 .
- an output unit 130 may further include an output unit 130 , a user input unit 140 , a sensing unit 150 , an audio/video (A/V) input unit 160 , and a memory 170 , in addition to the communicator 110 and the controller 120 .
- A/V audio/video
- the communicator 110 may transmit, to the authorization server 200 , identifier information of at least one other user with whom a use authority with respect to a service that is allowed for a user of the first terminal 100 is to be shared.
- the communicator 110 may also transmit, to the authorization server 200 , information about a validity period during which the use authority with respect to the service is shared with the at least one other user.
- the communicator 110 may receive, from the authorization server 200 , an agreement message for checking whether to share the use authority with respect to the service with a user of the second terminal 300 . With respect to the agreement message received from the authorization server 200 , the communicator 110 may transmit a response message indicating whether to agree to share the use authority with respect to the service with the user of the second terminal 300 .
- the communicator 110 may include one or more elements allowing communication between the first terminal 100 and other devices.
- the other devices may include the authorization server 200 and the second terminal 300 .
- the communicator 110 may include a short-range wireless communicator 111 , a mobile communicator 112 , and a broadcast receiver 113 .
- the short-range wireless communicator 111 may include, but is not limited to, a Bluetooth (BT) communicator, a Bluetooth low energy (BLE) communicator, a near field communication (NFC) unit, a wireless local area network (WLAN) communicator, a ZigBee communicator, an infrared Data Association (IrDA) communicator, a Wi-Fi Direct (WFD) communicator, an ultra wideband (UWB) communicator, and an Ant+ communicator.
- BT Bluetooth
- BLE Bluetooth low energy
- NFC near field communication
- WLAN wireless local area network
- ZigBee ZigBee communicator
- IrDA infrared Data Association
- WFD Wi-Fi Direct
- UWB ultra wideband
- the mobile communicator 112 exchanges a wireless signal with at least one of a base station, an external terminal, and a server on a mobile communication network.
- the wireless signal may include various types of data according to communication of a sound call signal, a video call signal, or a text/multimedia message.
- the broadcast receiver 113 receives a broadcast signal and/or information related to a broadcast from the outside through a broadcast channel.
- the broadcast channel may include a satellite channel and a ground wave channel.
- the first terminal 100 may not include the broadcast receiver 113 .
- the controller 120 generally controls all operations of the first terminal 100 .
- the controller 120 may control the communicator 110 , the output unit 130 , the user input unit 140 , the sensing unit 150 , the A/V input unit 160 , and the memory 170 by executing programs stored in the memory 170 .
- the controller 120 may determine, based on an input by the user of the first terminal 100 , the at least one other user with whom the use authority with respect to the service that is allowed for the user is sharable. In addition, the controller 120 may determine the validity period during which the use authority is shared with the at least one other user.
- the output unit 130 may output a text, an image signal, an audio signal, or a vibration signal, and may include a display unit 131 , a sound output unit 132 , a vibration motor 133 , or the like.
- the display unit 131 may display a user interface for receiving an input for information of the at least one other user with whom the use authority with respect to the service is to be shared.
- the display unit 131 may include, but is not limited to, a key pad, a dome switch, a touch pad (a touch capacitive type touch pad, a pressure resistive type touch pad, an infrared beam sensing type touch pad, a surface acoustic wave type touch pad, an integral strain gauge type touch pad, a piezo effect type touch pad, or the like), a jog wheel, and a jog switch.
- a key pad a dome switch
- a touch pad a touch capacitive type touch pad, a pressure resistive type touch pad, an infrared beam sensing type touch pad, a surface acoustic wave type touch pad, an integral strain gauge type touch pad, a piezo effect type touch pad, or the like
- a jog wheel a jog wheel
- a jog switch a jog wheel
- the display unit 131 and a touch pad may form a mutual layer structure and then may be formed as a touch screen.
- the display unit 131 may include at least one of liquid crystal display (LCD), a thin film transistor-liquid crystal display (TFT-LCD), n organic light-emitting diode (OLED) display, a flexible display, a three-dimensional (3D) display, and an electrophoretic display.
- the first terminal 100 may include at least two display units 131 .
- the sound output unit 132 may output audio data that is received from the communicator 110 or is stored in the memory 170 .
- the sound output unit 132 may also output a sound signal (e.g., a call signal receiving sound, a message receiving sound, a notifying sound, or the like) related to capabilities performed by the first terminal 100 .
- the sound output unit 132 may include a speaker, a buzzer, or the like.
- the vibration motor 133 may output a vibration signal.
- the vibration motor 133 may output the vibration signal that corresponds to an output of the audio data (e.g., the call signal receiving sound, the message receiving sound, or the like) or video data.
- the vibration motor 133 may output a vibration signal.
- the user input unit 140 may indicate a unit by which a user inputs data so as to control the first terminal 100 .
- the user input unit 140 may include, but is not limited to, a key pad, a dome switch, a touch pad (a touch capacitive type touch pad, a pressure resistive type touch pad, an infrared beam sensing type touch pad, a surface acoustic wave type touch pad, an integral strain gauge type touch pad, a piezo effect type touch pad, or the like), a jog wheel, and a jog switch.
- the at least one other user with whom the use authority with respect to the service that is allowed for the user is to be shared may be determined.
- the validity period during which the use authority with respect to the service is shared with the at least one other user may be set.
- the sensing unit 150 may sense a state of the first terminal 100 or a status around the first terminal 100 and may transfer sensed information to the controller 120 .
- the sensing unit 150 may include, but is not limited to, at least one of a magnetic sensor 151 , an acceleration sensor 152 , a temperature/humidity sensor 153 , an infrared sensor 154 , a gyroscope sensor 155 , a position sensor 156 (e.g., a global positioning system (a GPS sensor)), an air pressure sensor 157 , a proximity sensor 158 , and a red green blue (RGB) sensor (i.e., a luminance sensor) 159 .
- Functions of the sensors may be intuitionally deduced by one of ordinary skill in the art by referring to names of the sensors, and thus, detailed descriptions thereof are omitted here.
- the A/V input unit 160 may receive an input of an audio signal or a video signal and may include a camera 161 and a microphone 162 .
- the camera 161 may obtain an image frame such as a still image or a moving picture via an image sensor during a video call mode or an image-capturing mode.
- An image that is captured via the image sensor may be processed by the controller 120 or a separate image processing unit (not shown).
- the image frame that is processed by the camera 161 may be stored in the memory 170 or may be transmitted to an external source via the communicator 110 . According to a configuration of the first terminal 100 , two or more cameras 161 may be arranged.
- the microphone 162 receives an input of an external sound signal and processes the received sound signal into electrical voice data.
- the microphone 162 may receive a sound signal from an external device or a speaker.
- the microphone 162 may use various noise removing algorithms.
- the memory 170 may store a program for processing and controlling the controller 120 , and may store a plurality of pieces of data that are input to or output from the first terminal 100 .
- the memory 170 may include a storage medium of at least one type selected from a flash memory, a hard disk, a multimedia card type memory, a card type memory such as a secure digital (SD) or xD-Picture (xD) card memory, a random access memory (RAM), a static random access memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disc, and an optical disc.
- the first terminal 100 may run web storage or a cloud server that performs a storage function of the memory 170 on the Internet.
- the programs stored in the memory 170 may be classified into a plurality of modules according to their functions, for example, into a user interface (UI) module 171 , a touch screen module 172 , a notification module 173 , etc.
- UI user interface
- the UI module 171 may provide a specialized UI or graphical user interface (GUI) associated with the first terminal 100 for each service.
- GUI graphical user interface
- the UI module 171 may divide a screen so as to allow a plurality of windows to be displayed thereon.
- the UI module 171 may display a plurality of items of data related to a plurality of services on the plurality of windows, respectively, wherein the services are executed in the first terminal 100 .
- the touch screen module 172 may detect a user's touch gesture on the touch screen and transmit information related to the touch gesture to the controller 120 .
- the touch screen module 172 may recognize and analyze a touch code.
- the touch screen module 172 may be configured by additional hardware including a controller.
- Various sensors may be arranged in or near the touch screen so as to detect a touch or a proximate touch on the touch sensor.
- An example of the sensor to detect the touch on the touch screen may include a tactile sensor.
- the tactile sensor detects a contact of a specific object at least as sensitively as a person can detect.
- the tactile sensor may detect various types of information such as the roughness of a contact surface, the hardness of the contact object, the temperature of a contact point, or the like.
- An example of the sensor to detect the touch on the touch screen may include a proximity sensor.
- the proximity sensor detects the existence of an object that approaches a predetermined detection surface or that exists nearby, by using a force of an electro-magnetic field or an infrared ray, instead of a mechanical contact.
- Examples of the proximity sensor include a transmission-type photoelectric sensor, a direction reflection-type photoelectric sensor, a mirror reflection-type photoelectric sensor, a high frequency oscillation-type proximity sensor, a capacity-type proximity sensor, a magnetic proximity sensor, an infrared-type proximity sensor, or the like.
- the touch gesture of the user may include a tap gesture, a touch & hold gesture, a double tap gesture, a drag gesture, a panning gesture, a flick gesture, a drag & drop gesture, a swipe gesture, or the like.
- the notification module 173 may generate a signal for notifying the user about an occurrence of an event in the first terminal 100 .
- Examples of the event that may occur in the first terminal 100 include a call signal receiving event, a message receiving event, a key signal input event, a schedule notifying event, or the like.
- the notification module 173 may output an alarm signal in the form of a video signal via the display unit 131 , an alarm signal in the form of an audio signal via the sound output unit 132 , or an alarm signal in the form of a vibration signal via the vibration motor 133 .
- FIG. 19 is a block diagram of an authorization server according to an embodiment of the present disclosure.
- the authorization server 200 may include a communicator 210 and a controller 220 (also referred to as a processor 220 ). However, not all shown elements are necessary elements. That is, the authorization server 200 may be embodied with more elements than the shown elements or may be embodied with fewer elements than the shown elements.
- the communicator 210 may obtain, from the first terminal 100 , identifier information of at least one other user with whom a use authority with respect to a service is sharable, and information about a validity period during which the use authority with respect to the service is shared with the at least one other user.
- the communicator 210 may transmit requested authentication information to the second terminal 300 .
- the communicator 210 may receive an authentication information request for the service from the second terminal 300 , wherein the authentication information request includes identifier information of the user of the second terminal 300 .
- the communicator 210 may transmit, to the second terminal 300 , information about a validity period that corresponds to the user of the second terminal 300 .
- the controller 220 may determine whether or not the user of the second terminal 300 is included in the at least one other user.
- the controller 220 may classify the identifier information of the at least one other user to a group according to the validity period, and may store the identifier information in a memory (not shown).
- FIGS. 20 and 21 are block diagrams of a second terminal according to various embodiments of the present disclosure.
- the second terminal 300 may include a communicator 310 and a controller 320 (also referred to as a processor 320 ). However, not all shown elements are necessary elements. That is, the second terminal 300 may be embodied with more elements than the shown elements or may be embodied with fewer elements than the shown elements.
- the second terminal 300 may further include an output unit 330 , a user input unit 340 , a sensing unit 350 , an A/V input unit 360 , and a memory 370 , in addition to the communicator 310 and the controller 320 .
- the communicator 310 may request the authorization server 200 for authentication information regarding a service.
- the communicator 310 may receive the authentication information from the authorization server 200 .
- the communicator 310 may transmit the received authentication information to a service providing apparatus that provides the service.
- the communicator 310 may receive validity period information corresponding to the user of the second terminal 300 from the authorization server 200 .
- the communicator 310 may include one or more elements allowing communication between the second terminal 300 and other devices.
- the other devices may include the authorization server 200 and the first terminal 100 .
- the communicator 310 may include a short-range wireless communicator 311 , a mobile communicator 312 , and a broadcast receiver 313 .
- the short-range wireless communicator 311 may include, but is not limited to, a BT communicator, a BLE communicator, a NFC unit, a WLAN (Wi-Fi) communicator, a ZigBee communicator, an IrDA communicator, a WFD communicator, a UWB communicator, and an Ant+ communicator.
- the mobile communicator 312 exchanges a wireless signal with at least one of a base station, an external terminal, and a server on a mobile communication network.
- the wireless signal may include various types of data according to communication of a sound call signal, a video call signal, or a text/multimedia message.
- the broadcast receiver 313 receives a broadcast signal and/or information related to a broadcast from the outside through a broadcast channel.
- the broadcast channel may include a satellite channel and a ground wave channel.
- the second terminal 300 may not include the broadcast receiver 313 .
- the controller 320 generally controls all operations of the second terminal 300 .
- the controller 320 may control the communicator 310 , the output unit 330 , the user input unit 340 , the sensing unit 350 , the A/V input unit 360 , and the memory 370 by executing programs stored in the memory 370 .
- the controller 320 may obtain a use authority with respect to the service during a temporal range set with respect to the second terminal 300 , based on the received authentication information. For example, the controller 320 may control the communicator 310 to transmit the received authentication information to a service providing apparatus that provide the service.
- the controller 320 may select a service with respect to which use authority is to be shared, based on an input by the user of the second terminal 300 .
- a request for sharing the use authority with respect to the service may be transmitted to the authorization server 200 by using the communicator 310 .
- the output unit 330 may output a text, an image signal, an audio signal, or a vibration signal, and may include a display unit 331 , a sound output unit 332 , a vibration motor 333 , or the like.
- the display unit 331 may display the authentication information received from the authorization server 200 .
- the display unit 331 may display information about a validity period during which the use authority with respect to the service is shared, the information being received from the authorization server 200 .
- the display unit 331 may display a user interface required to receive the service.
- the user interface required to receive the service may be received from the service providing apparatus when the authentication information obtained by the second terminal 300 is transmitted to the authorization server 200 .
- the display unit 331 may include, but is not limited to, a key pad, a dome switch, a touch pad (a touch capacitive type touch pad, a pressure resistive type touch pad, an infrared beam sensing type touch pad, a surface acoustic wave type touch pad, an integral strain gauge type touch pad, a piezo effect type touch pad, or the like), a jog wheel, and a jog switch.
- a key pad a dome switch
- a touch pad a touch capacitive type touch pad, a pressure resistive type touch pad, an infrared beam sensing type touch pad, a surface acoustic wave type touch pad, an integral strain gauge type touch pad, a piezo effect type touch pad, or the like
- a jog wheel a jog wheel
- a jog switch a jog wheel
- the display unit 331 and a touch pad may form a mutual layer structure and then may be formed as a touch screen.
- the display unit 331 may include at least one of an LCD, a TFT-LCD, an OLED display, a flexible display, a 3D display, and an electrophoretic display.
- the second terminal 300 may include at least two display units 331 .
- the sound output unit 332 may output audio data that is received from the communicator 310 or is stored in the memory 370 .
- the sound output unit 332 may also output a sound signal (e.g., a call signal receiving sound, a message receiving sound, a notifying sound, or the like) related to capabilities performed by the second terminal 300 .
- the sound output unit 332 may include a speaker, a buzzer, or the like.
- the vibration motor 333 may output a vibration signal.
- the vibration motor 333 may output the vibration signal that corresponds to an output of the audio data (e.g., the call signal receiving sound, the message receiving sound, or the like) or video data.
- the vibration motor 333 may output a vibration signal.
- the user input unit 340 may indicate a unit by which a user inputs data so as to control the second terminal 300 .
- the user input unit 340 may include, but is not limited to, a key pad, a dome switch, a touch pad (a touch capacitive type touch pad, a pressure resistive type touch pad, an infrared beam sensing type touch pad, a surface acoustic wave type touch pad, an integral strain gauge type touch pad, a piezo effect type touch pad, or the like), a jog wheel, and a jog switch.
- a request for sharing a use authority with respect to a selected service may be transmitted to the authorization server 200 , based on a user input sensed by the user input unit 340 .
- the sensing unit 350 may sense a state of the second terminal 300 or a status around the second terminal 300 and may transfer sensed information to the controller 320 .
- the sensing unit 350 may include, but is not limited to, at least one of a magnetic sensor 351 , an acceleration sensor 352 , a temperature/humidity sensor 353 , an infrared sensor 354 , a gyroscope sensor 355 , a position sensor 356 (e.g., a GPS sensor), an air pressure sensor 357 , a proximity sensor 358 , and an RGB sensor (i.e., a luminance sensor) 359 .
- Functions of the sensors may be intuitionally deduced by one of ordinary skill in the art by referring to names of the sensors, and thus, detailed descriptions thereof are omitted here.
- the A/V input unit 360 may receive an input of an audio signal or a video signal and may include a camera 361 and a microphone 362 .
- the camera 361 may obtain an image frame such as a still image or a moving picture via an image sensor during a video call mode or an image-capturing mode.
- An image that is captured via the image sensor may be processed by the controller 320 or a separate image processing unit (not shown).
- the image frame that is processed by the camera 361 may be stored in the memory 370 or may be transmitted to an external source via the communicator 310 . According to a configuration of the second terminal 300 , two or more cameras 361 may be arranged.
- the microphone 362 receives an input of an external sound signal and processes the received sound signal into electrical voice data.
- the microphone 362 may receive a sound signal from an external device or a speaker.
- the microphone 362 may use various noise removing algorithms.
- the memory 370 may store a program for processing and controlling the controller 320 , and may store a plurality of pieces of data that are input to or output from the second terminal 300 .
- the memory 370 may include a storage medium of at least one type selected from a flash memory, a hard disk, a multimedia card type memory, a card type memory such as a SD or xD card memory, a RAM, a SRAM, a ROM, an EEPROM, a PROM, a magnetic memory, a magnetic disc, and an optical disc.
- the second terminal 300 may run web storage or a cloud server that performs a storage function of the memory 370 on the Internet.
- the programs stored in the memory 370 may be classified into a plurality of modules according to their functions, for example, into a UI module 371 , a touch screen module 372 , a notification module 373 , etc.
- the UI module 371 may provide a specialized UI or GUI associated with the second terminal 300 for each service.
- the UI module 371 may divide a screen so as to allow a plurality of windows to be displayed thereon.
- the UI module 371 may display a plurality of items of data related to a plurality of services on the plurality of windows, respectively, wherein the services are executed in the second terminal 300 .
- the touch screen module 372 may detect a user's touch gesture on the touch screen and transmit information related to the touch gesture to the controller 320 .
- the touch screen module 372 may recognize and analyze a touch code.
- the touch screen module 372 may be configured by additional hardware including a controller.
- Various sensors may be arranged in or near the touch screen so as to detect a touch or a proximate touch on the touch sensor.
- An example of the sensor to detect the touch on the touch screen may include a tactile sensor.
- the tactile sensor detects a contact of a specific object at least as sensitively as a person can detect.
- the tactile sensor may detect various types of information such as the roughness of a contact surface, the hardness of the contact object, the temperature of a contact point, or the like.
- An example of the sensor to detect the touch on the touch screen may include a proximity sensor.
- the proximity sensor detects the existence of an object that approaches a predetermined detection surface or that exists nearby, by using a force of an electro-magnetic field or an infrared ray, instead of a mechanical contact.
- Examples of the proximity sensor include a transmission-type photoelectric sensor, a direction reflection-type photoelectric sensor, a mirror reflection-type photoelectric sensor, a high frequency oscillation-type proximity sensor, a capacity-type proximity sensor, a magnetic proximity sensor, an infrared-type proximity sensor, or the like.
- the touch gesture of the user may include a tap gesture, a touch & hold gesture, a double tap gesture, a drag gesture, a panning gesture, a flick gesture, a drag & drop gesture, a swipe gesture, or the like.
- the notification module 373 may generate a signal for notifying the user about an occurrence of an event in the second terminal 300 .
- Examples of the event that may occur in the second terminal 300 include a call signal receiving event, a message receiving event, a key signal input event, a schedule notifying event, or the like.
- the notification module 373 may output an alarm signal in the form of a video signal via the display unit 331 , an alarm signal in the form of an audio signal via the sound output unit 332 , or an alarm signal in the form of a vibration signal via the vibration motor 333 .
- the methods according to the embodiments can be embodied as programmed commands to be executed in various computer means, and then can be recorded to a non-transitory computer-readable recording medium.
- the non-transitory computer readable recording medium may include one or more of the programmed commands, data files, data structures, or the like.
- the programmed commands recorded to the non-transitory computer-readable recording medium may be particularly designed or configured for the disclosure or may be well known to one of ordinary skill in the art.
- non-transitory computer-readable recording medium examples include magnetic media including hard disks, magnetic tapes, and floppy disks, optical media including compact disc ROMs (CD-ROMs), and digital versatile discs (DVDs), magneto-optical media including floptical disks, and a hardware apparatus designed to store and execute the programmed commands in ROM, RAM, flash memories, and the like.
- Examples of the programmed commands include not only machine codes generated by a compiler but also include great codes to be executed in a computer by using an interpreter.
- the apparatuses may include a processor, a memory for storing and executing program data, a permanent storage including a disk drive, a communication port for communication with an external device, a user interface device including a touch panel, a key, a button, and the like.
- the methods embodied as a software module or an algorithm may be stored as computer-readable codes or program commands that are executable on the processor in a non-transitory computer-readable recording medium.
- the non-transitory computer-readable recording medium is any data storage device that can store data which can be thereafter read by a computer system.
- non-transitory computer-readable recording medium examples include magnetic storage mediums (e.g., ROMs, RAMs, floppy disks, hard disks, etc.) and optical reading mediums including CD-ROMs, DVDs, etc.
- the non-transitory computer-readable recording medium can also be distributed over network-coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion.
- the mediums can be read by computers, can be stored in the memory, and can be executed on the processor.
- the embodiments may be described in terms of functional block components and various processing operations. Such functional blocks may be realized by any number of hardware and/or software components configured to perform the specified functions.
- the embodiments may employ various integrated circuit components, e.g., memory elements, processing elements, logic elements, look-up tables, and the like, which may carry out a variety of functions under the control of one or more microprocessors or other control devices.
- the embodiments may employ same or different types of cores and different types of CPUs.
- the elements of the disclosure are implemented using software programming or software elements, the disclosure may be implemented with any programming or scripting language such as C, C++, Java, assembler, or the like, with the various algorithms being implemented with any combination of data structures, objects, processes, routines or other programming elements.
- the embodiments could employ any number of techniques according to the related art for electronics configuration, signal processing and/or control, data processing and the like.
- the words “mechanism”, “element”, “means”, or “configuration” may be used broadly and is not limited to mechanical or physical embodiments, but can include software routines in conjunction with processors, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
- Databases & Information Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (9)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150155795A KR102349454B1 (en) | 2015-11-06 | 2015-11-06 | Method and apparatus to share authority for using service and recording medium thereof |
KR10-2015-0155795 | 2015-11-06 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20170134393A1 US20170134393A1 (en) | 2017-05-11 |
US10440032B2 true US10440032B2 (en) | 2019-10-08 |
Family
ID=58664318
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/280,242 Active 2037-04-18 US10440032B2 (en) | 2015-11-06 | 2016-09-29 | Method, apparatus, and recording medium for sharing use authority with respect to service |
Country Status (2)
Country | Link |
---|---|
US (1) | US10440032B2 (en) |
KR (1) | KR102349454B1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2018107529A (en) * | 2016-12-22 | 2018-07-05 | ブラザー工業株式会社 | Image processing device |
CN107679378A (en) * | 2017-10-01 | 2018-02-09 | 宁波亿拍客网络科技有限公司 | One kind exceedes a kind of password and coordinates verification method |
JP2019121123A (en) * | 2017-12-28 | 2019-07-22 | トヨタ自動車株式会社 | Image processing system, image processing apparatus, image processing method, image processing program, and vehicular interior sharing system |
AU2018425774B2 (en) * | 2018-05-31 | 2022-06-02 | Huawei Technologies Co., Ltd. | Application function implementation method and electronic device |
CN109246217A (en) * | 2018-09-12 | 2019-01-18 | 厦门优胜卫厨科技有限公司 | A kind of matching method of intelligent bathtub equipment, pair system and intelligent bathtub equipment |
CN109917667B (en) * | 2019-03-31 | 2021-06-22 | 广东美的制冷设备有限公司 | Household appliance and control authority sharing method thereof, control terminal and storage medium |
EP3739490A1 (en) | 2019-05-17 | 2020-11-18 | Samsung Electronics Co., Ltd. | Server and control method thereof |
US11757883B2 (en) * | 2020-06-18 | 2023-09-12 | T-Mobile Usa, Inc. | Borrower privacy enhancement for shared-line solutions |
CN111755092B (en) * | 2020-07-06 | 2021-08-13 | 重庆中联信息产业有限责任公司 | Medical data interconnection and intercommunication method and medical system |
CN113452760A (en) * | 2021-06-08 | 2021-09-28 | 阿波罗智联(北京)科技有限公司 | Verification code synchronization method and device, electronic equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050086106A (en) | 2004-02-25 | 2005-08-30 | 권영길 | Method of automatic log-in for web sites and method to hold the log-in information in common |
US20060230437A1 (en) * | 2005-04-06 | 2006-10-12 | Actividentity, Inc. | Secure digital credential sharing arrangement |
US20080083021A1 (en) * | 2006-10-02 | 2008-04-03 | Presenceid, Inc. | Systems and methods for delegating information technology authorization to at least one other person |
US20100146611A1 (en) * | 2008-12-09 | 2010-06-10 | Microsoft Corporation | Credential Sharing Between Multiple Client Applications |
US20100319068A1 (en) * | 2007-08-27 | 2010-12-16 | Nec Europe Ltd | Method and system for performing delegation of resources |
US20110225643A1 (en) * | 2010-03-12 | 2011-09-15 | Igor Faynberg | Secure dynamic authority delegation |
US20120117626A1 (en) * | 2010-11-10 | 2012-05-10 | International Business Machines Corporation | Business pre-permissioning in delegated third party authorization |
US20140068727A1 (en) | 2012-09-05 | 2014-03-06 | Apple Inc. | Wi-fi credential sharing using images |
US20140380429A1 (en) * | 2013-06-21 | 2014-12-25 | Canon Kabushiki Kaisha | Authority delegate system, authorization server system, control method, and program |
-
2015
- 2015-11-06 KR KR1020150155795A patent/KR102349454B1/en active Active
-
2016
- 2016-09-29 US US15/280,242 patent/US10440032B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20050086106A (en) | 2004-02-25 | 2005-08-30 | 권영길 | Method of automatic log-in for web sites and method to hold the log-in information in common |
US20060230437A1 (en) * | 2005-04-06 | 2006-10-12 | Actividentity, Inc. | Secure digital credential sharing arrangement |
US20080083021A1 (en) * | 2006-10-02 | 2008-04-03 | Presenceid, Inc. | Systems and methods for delegating information technology authorization to at least one other person |
US20100319068A1 (en) * | 2007-08-27 | 2010-12-16 | Nec Europe Ltd | Method and system for performing delegation of resources |
US20100146611A1 (en) * | 2008-12-09 | 2010-06-10 | Microsoft Corporation | Credential Sharing Between Multiple Client Applications |
US20110225643A1 (en) * | 2010-03-12 | 2011-09-15 | Igor Faynberg | Secure dynamic authority delegation |
US20120117626A1 (en) * | 2010-11-10 | 2012-05-10 | International Business Machines Corporation | Business pre-permissioning in delegated third party authorization |
US20140068727A1 (en) | 2012-09-05 | 2014-03-06 | Apple Inc. | Wi-fi credential sharing using images |
US20140380429A1 (en) * | 2013-06-21 | 2014-12-25 | Canon Kabushiki Kaisha | Authority delegate system, authorization server system, control method, and program |
Also Published As
Publication number | Publication date |
---|---|
US20170134393A1 (en) | 2017-05-11 |
KR20170053372A (en) | 2017-05-16 |
KR102349454B1 (en) | 2022-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10440032B2 (en) | Method, apparatus, and recording medium for sharing use authority with respect to service | |
US9717065B2 (en) | Indoor remote triggered location scanning | |
US10891363B2 (en) | User authenticating method and device | |
US9538384B2 (en) | Method and apparatus for a device management application | |
US9832607B2 (en) | Method of processing beacon of electronic device and electronic device thereof | |
US20150350820A1 (en) | Beacon additional service of electronic device and electronic device for same background arts | |
US20140181683A1 (en) | Method and system for controlling external device | |
US9860738B2 (en) | Method for processing multiple pieces of SIM information and electronic device thereof | |
KR20180090586A (en) | Method for providing notification and an electronic device thereof | |
CN108574975A (en) | Wireless routers, IoT devices, and systems for supporting wireless routers connected to IoT devices | |
KR102436509B1 (en) | Method, Appratus and System of providing temporal account information | |
US10891599B2 (en) | Use of state objects in near field communication (NFC) transactions | |
US20160277878A1 (en) | Method for communicating data and electronic device thereof | |
CN105392150A (en) | beacon managing method, terminal equipment, server and storage medium | |
US10743137B2 (en) | Systems and methods for facilitating dynamic remote assistance networks | |
EP2916257B1 (en) | Proximity communication method and apparatus | |
US20170243023A1 (en) | Electronic device and operating method thereof | |
US11250656B2 (en) | Electronic apparatus and operating method thereof | |
US10856144B2 (en) | Method, server, and terminal for transmitting and receiving data | |
US10795988B2 (en) | Device and method of requesting external device to execute task | |
US20190174357A1 (en) | Electronic device and method for controlling the electronic device for joint transmission thereof | |
US11044036B2 (en) | Device and method for performing data communication with slave device | |
WO2014143114A1 (en) | Selective operation of executable procedures based on detected gesture and context | |
US10873847B2 (en) | Method and host device for communicating among multiple devices | |
US9635130B2 (en) | Method and apparatus for setting communication and recording medium thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SAMSUNG ELECTRONICS CO., LTD., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ISLAM, MOHAMMAD SHAHIDUL;CHOYON, REDWAN UL HAQ;REEL/FRAME:039897/0559 Effective date: 20160929 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |