Apparatus and method for notifying of security information in electronic device and computer-readable recording medium for the same
09600691 ยท 2017-03-21
Assignee
Inventors
- Younkyu Heo (Gyeonggi-do, KR)
- Youngkyoo KIM (Seoul, KR)
- Mooyoung Kim (Seoul, KR)
- MinJung Kim (Gyeonggi-do, KR)
- Dongho Jang (Gyeonggi-do, KR)
- Jaebong Chun (Gyeonggi-do, KR)
Cpc classification
G06F2221/2121
PHYSICS
G06F21/606
PHYSICS
International classification
Abstract
An apparatus and a method for displaying information required to be secured in a wireless communication terminal are provided. The method includes recognizing generation of notification information of one or more processes activated in a first operation mode among a plurality of operation modes including the first operation mode and a second operation mode; and notifying a user of a part of the notification information when a current operation mode is the second operation mode.
Claims
1. A method of providing notification to a user of an electronic device, the method comprising: recognizing, by a secure operating system, at least one secure notification event occurred by at least one secure process; generating, by the secure operating system, a secure notification message using a portion of information on the at least one secure notification event when the electronic device is being operated in a non-secure operation mode; providing the secure notification message to a non-secure operating system; and in response to receiving the secure notification message, providing, by the non-secure operating system, the secure notification message to a user of the electronic device, wherein the secure notification message includes at least a number of times that the notification information has been genrated to the user.
2. The method of claim 1, wherein the portion of information includes at least one of whether notification information has been generated, a type of the notification information, the number of times that the notification information has been generated, and an amount of data included in the notification information.
3. The method of claim 1, wherein the portion of the information corresponds to a part of data to be displayed for the user in accordance with notification information while the electronic device operates with a secure operating system.
4. The method of claim 1, wherein providing, by the non-secure operating system, the secure notification message to the user comprises: transmitting at least the portion of the information to a notification message process which collects notification information by one or more secure processes generating the notification information; and notifying the user of the portion of the information by the notification message process.
5. The method of claim 1, wherein providing, by the non-secure operating system, the secure notification message to the user comprises: displaying at least the portion of the information on at least a part of a display screen of the electronic device.
6. The method of claim 1, wherein data of a secure process is encrypted and stored in a memory area separated from non-secure process data and allocated to secure process data, and wherein only an authenticated user is allowed to access data stored in the memory area allocated to secure process data.
7. The method of claim 1, further comprising: detecting a request for access to resources set to be accessible only while the electronic device operates with a secure operating system; and blocking the request for access while the electronic device operates with a non-secure operating system.
8. The method of claim 7, wherein blocking the request for access comprises: displaying a message indicating that the request for access is blocked on a display screen of the electronic device.
9. The method of claim 7, further comprising: providing an authentication method to access a secure operating system to the user; and allowing the requested access if the user succeeds in authentication through the provided authentication method.
10. An electronic device comprising: a recognition module which recognizes at least one secure notification event occurred by at least one secure process, generates a secure notification message using a portion of information on the at least one secure notification event when the electronic device is being operated in a non-secure operation mode, and provides the secure notification message to a non-secure operating system; and a notification module which receives the secure notification message in the non-secure operating system, and provides the secure notification message to a user of the electronic device, wherein the secure notification message includes at least a number of times that the notification information has been genrated to the user.
11. The electronic device of claim 10, wherein the portion of information includes at least one of whether notification information has been generated, a type of the notification information, the number of times that the notification information has been generated, and an amount of data included in the notification information.
12. The electronic device of claim 10, wherein the portion of the information corresponds to a part of data to be displayed for the user in accordance with notification information while the electronic device operates with a secure operating system.
13. Previously Presented) The electronic device of claim 10, wherein the notification module receives at least the portion of the information from a notification message process having notification information and notifies the user of the received portion of the information.
14. The electronic device of claim 10, wherein the notification module displays the portion of the information on at least a part of an area of a display screen of the electronic device.
15. The electronic device of claim 10, wherein data of a secure process is encrypted and stored in a memory area which is separated from non-secure process date and allocated to secure process data, and wherein only an authenticated user is allowed to access the data stored in the memory area allocated to the secure process data.
16. The electronic device of claim 10, further comprising: an access control module which, when an access request for resources set to be accessible only while the electronic device operates with a secure operating system is detected, blocks the access request while the electronic device operates with a non-secure operating system.
17. A non-transitory computer-readable storage medium storing commands, the commands being set to allow one or more processors to perform one or more operations when the commands are executed by the one or more processes, the one or more operations comprising: recognizing, by a secure operating system, at least one secure notification event occurred by at least one secure process; generating, by the secure operating system, a secure notification message using a portion of information on the at least one secure notification event when the electronic device is being operated in a non-secure operation mode; providing the secure notification message to a non-secure operating system; and in response to receiving the secure notification message, providing, by the non-secure operating system, the secure notification message to a user of the electronic device, wherein the secure notification message includes at least a number of times that the notification information has been genrated to the user.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The above and other aspects, features and advantages of the present invention will be more apparent from the following detailed description in conjunction with the accompanying drawings, in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DETAILED DESCRIPTION OF EMBODIMENTS OF THE PRESENT INVENTION
(10) Hereinafter embodiments of the present invention will be described with reference to the accompanying drawings. The accompanying drawings of this specification are provided to help understating embodiments of the present invention and it should be noted that the present invention is not limited by types or layouts illustrated in the accompanying drawings of this specification. Further, the equivalents or expansions for additional embodiments of the accompanying drawings of this specification should be understood by the description referring to the drawings.
(11) According to embodiments disclosed in this specification, when notification information of a security mode is required to be displayed while an electronic device having the security mode and a non-security mode operates in the non-security mode, an indication informing the user that there is the notification information of the security mode may be displayed in real time. Accordingly, the user can immediately detect the generation of the notification information in the security mode to take action in time.
(12) Further, when the notification information of the security mode is required to be displayed in the non-security mode, the electronic device provides some information such as an event type indicating which event has been generated and a number of generated events, thereby preventing unnecessary information from being leaked.
(13) Embodiments disclosed in this specification provide a display method capable of providing security when an event required to be secured, such as a company e-mail, is generated in the electronic device, which can be used in both the security mode and the non-security mode, and a notification message of the event is displayed.
(14) The electronic device according to various embodiments of the present invention may be a desktop Personal Computer (PC), a laptop PC, a Personal Digital Assistant (PDA), a Portable Multimedia Player (PMP), a tablet PC, a mobile phone, a video phone, a feature phone, a smart phone, an electronic book reader, a digital camera, a wearable device, a wireless device, a Global Positioning System (GPS) system, a hand-held device, an MP3 player, a camcorder, a game console, an electronic watch, a flat panel device, an electronic photograph, an electronic board, an electronic sign board, a projector, a navigation device, a black box, a set-top box, an electronic dictionary, a refrigerator, an air conditioner, a vacuum cleaner, an artificial intelligence robot, a TeleVision (TV), Digital Versatile Disk (DVD) player, a stereo, an oven, a microwave oven, a washing machine, an air cleaner, a medical device, a vehicle device, a shipbuilding device, an aircraft device, a security device, agricultural, livestock, fishery equipment, electronic clothing, an electronic key, an electronic bracelet, an electronic necklace, and the like. For example, the electronic devices may be driven by various operating systems, such as Android, iOS, Windows, Linux, Symbian, Tizen, and Bada. It is apparent to those skilled in the art that the electronic device and the operating system according to embodiments of the present invention are not limited to the above described examples.
(15)
(16) The electronic device includes a communication module 110, a camera unit 103, a memory 105, a display unit 106, an input unit 107, and a controller 111. The electronic device may include other components as well as the components illustrated in
(17) The communication module 110 include an antenna ANT, a radio unit 101, a modem 102, a microphone MIC, and a speaker SPK. The antenna ANT is manufactured in accordance with a band for transmitting and receiving a frequency signal required for communication of a portable terminal and is connected to the radio unit 101. In the following description, it is assumed that the communication module 110 accesses a mobile communication network. However, the communication module 110 may access a wireless network, such as a wireless Local Area Network (LAN), instead of the mobile communication network. In this event, all the components illustrated in
(18) The radio unit 101 band up-converts data to be transmitted for voice or/and data communication with the mobile communication network and band down-converts the received data. That is, the radio unit 101 band up-converts data of a baseband for data transmission and transmits the data to the corresponding network through the antenna ANT, and receives a radio signal from the corresponding network through the antenna ANT, band down-converts the radio signal, and converts the radio signal to a baseband signal.
(19) The modem 102 performs a series of data processing, such as modulation, demodulation, encoding, and decoding of the data. In
(20) The camera unit 103 acquires still image data or dynamic image data by receiving light reflected from a subject through a lens or converting the light reflected from the subject to an electrical signal. The camera unit 103 converts the acquired still image data or dynamic image data to data having the type which can be processed by the controller 111 and provides the converted data to the controller 111.
(21) The memory 105 refers to a storage medium, such as a Read Only Memory (ROM) or/and Random Access Memory (RAM) and stores various control data required for operations of the electronic device. According to embodiments of the present invention, the memory 105 stores control data for operations according to the security mode and the non-security mode and data for controlling a display when a particular event is generated in each of the modes. Further, the memory 105 may include areas for storing user data.
(22) The display unit 106 may be implemented in the type of a Liquid Crystal Display (LCD) panel or a Light Emitting Display (LED) panel and may display a state of the electronic device in processes required for the operations of the electronic device, and in a standby state, by a control of the controller 101. Further, the display unit 106 may display all or some of the generated events according to the embodiments of the present invention.
(23) Besides the display unit 106 transmitting visual information, the electronic device may further include an additional component which can transmit various types of information, such as a sound, and a vibration to the user.
(24) The input unit 107 includes all user input interfaces such as a touch input or/and an electronic pen or/and a key input. The input unit 107 receives user input information through each of the input interfaces and provides the information to the controller 111.
(25)
(26) As illustrated in
(27) In
(28) In
(29) The security mode notification proxy process 221 receives event information generated by all application (hereinafter referred to as an app processes 212, 213, . . . , 214 operating in the security mode and collect the received event information, and may control events generated by the app processes 212, 213, . . . , 214 to be displayed as one message or displayed, respectively.
(30) Each of the processes of the non-security mode will be first described. The non-security mode includes processes required when the user generally uses the electronic device as described above. An app store process 201 is a process for generally accessing an app store in the electronic device. According to the present invention, the app store process 201 may perform together an operation for generally accessing the app store and an operation for accessing the app store in the security mode. This will be described in more detailed with reference to the drawings described below.
(31) A management agent process 205 is a process required when an app to be used in the security mode is downloaded. The management agent process 205 will be described in more detail in the drawings described below.
(32) A first app process 202, a second app process 203, and an nth app process 204 may be general app processes. For example, processes 202, 203, . . . , 204 may be app processes for performing a mailing service, a schedule management, and a text message, respectively.
(33) Next, the processes of the security mode will be described. The security mode corresponds to a mode for the company requiring the security. Accordingly, the remaining processes 212, 213, . . . , 214 except for a security mode management process 215 and a security mode app store process 211 are required to have an additional function for the security.
(34) In the following description, it is assumed that a security mode first app process 213 is a process for processing a mailing service.
(35) In general, the security mode first app process 213 performs an encryption to enhance the security of received data while performing an operation for the mailing service. Accordingly, the security mode first app process 213 providing the mailing service includes a module for the encryption and a proxy for inducing mailing service data to be processed in a security enhanced mode. That is, one process may add the module for the encryption and the proxy for the induction of the encryption processing to the basic operations of the process.
(36) Further, the security mode first app process 213 includes a method of, when an address for storing generated data is created, storing the data differently from the processing by a general process. That is, when the security mode first app process 213 corresponds to the mailing service, the security mode first app process 213 generates an address for storing mail data in a preset security area of the memory 105 through a method different from that in which a general mailing service process receives and generates an address for storing the received mail data.
(37) This is also equally applicable to a security mode download process 212. That is, unlike a process of downloading data in the non-security mode, the security mode download process 212 includes an encryption module for encrypting received data and a proxy for inducing the encryption. Further, the method of generating the address for storing the encrypted data may be different from a method in which the non-security mode download process generates an address.
(38) Meanwhile, when a particular event for providing a notification message, such as reception of mail, is generated in a corresponding process, the security mode download process 212, the security mode first app process 213, . . . , and a security mode mth app process 214 provide the generated event to the security mode notification proxy process 221 included within the notification message process 220. At this time, a message generated for informing of the event may have a form different from that of an event notification of the non-security mode. That is, some information such as a type of the generated event is informed of and detailed information on the generated event is not provided. For example, when one mail corresponds to the received event, the corresponding app process informs the security mode notification proxy process 221 only of the reception of the mail and does not inform of a sender and a subject of the mail. That is, when a particular event is generated, all processes of the security mode may be configured to provide only the generation of the corresponding event to the security mode notification proxy process 221.
(39) Then, the security mode notification proxy process 221 directly displays the corresponding message when a current mode is the security mode. In some implementations, the security notification proxy process 221 may inform of the type of generated event regardless of the current mode. This will be described with reference to
(40)
(41) As illustrated in
(42) The area 301 for informing of the generation of the particular event according to the present invention may be at least a part of all areas of the electronic device as well as an area illustrated in
(43)
(44) 1. Receive non-security mode mail->receive security mode first mail->receive security mode second mail->receive security mode third mail
(45) 2. Receive security mode first mail->receive non-security mode mail->receive security mode second mail->receive security mode third mail
(46) 3. Receive security mode first mail->receive security second mode mail->receive non-security mode mail->receive security mode third mail
(47) 4. Receive security mode first mail->receive security mode second mail->receive security mode third mail->receive non-security mode mail
(48) According to the present invention, any of the above four orders can be applied. Further, notification information of mails received according to the four orders may be sequentially stored in a predetermined stack (not shown).
(49) According to embodiments of the present invention, in a case of the non-security mode mail, the notification message process 220 may display reception of a mail (Email has arrived), a sender of the mail (from: Mathew (m.nilson@gmail.com)), and a subject (Subject: Hey, are you coming this weekend?) on the display unit 106 as indicated by the reference numeral 321.
(50) Further, according to embodiments of the present invention, in a case of the security mode mail, the security mode notification proxy process 221 of the notification message process 220 displays an indication (3 Email messages are unread in security mode) simply indicating that three mails have been received in the security mode on the display unit 106 as indicated by the reference numeral 322. In some implementations, when a current mode is the security mode, the security mode notification proxy process 221 may display detailed information of the corresponding message as indicated by the reference numeral 321.
(51) As illustrated in
(52) It is assumed that a state where the notification message is displayed as illustrated in
(53) A subject identifying the pre-stored policy file may be the security mode management process 215 or a separate process may exist to identify whether to allow the access. Further, in both cases where there is the separate process and the security mode management process 215 performs whether to allow the access, performs a corresponding function when the access is allowed, and a message informing that the access is not allowed is displayed on the display unit 106 when the access is not allowed.
(54)
(55) In
(56) In the complex inquiry rejection popup message 420, selection icons 421 and 422 for identifying whether to accept the denial of the access and an inquiry icon 423 for asking about a later access permission type are displayed. As illustrated in
(57) Further, in the complex inquiry denial popup message 420, the inquiry icon 423 about the later access permission type may be included. The access permission type illustrated in
(58) 1. Don't see this warning . . .
(59) 2. Block this case only
(60) 3. Log only
(61) 4. Turn off this warning
(62) When a number of additional cases of the access permissions should be added to the above listed access permission types, other cases may be further added. When there are unnecessary access permission types in the above listed access permission types, the corresponding access permission types may be deleted so that the number of cases may be reduced.
(63) Based on the above description, a method of providing information of the security mode in the non-security mode will be described.
(64) When an event placing importance on real time transference is generated in the security mode while the user uses the electronic device in the non-security mode, each of the processes of the security mode provides minimum information on the generated event to the notification message process 220 or the security mode notification proxy process 221.
(65) Then, the notification message process 220 or the security mode notification proxy process 221 receives corresponding event information and outputs received data through the display unit 106. Accordingly, a message of the security mode placing importance on the real time transference may be identified also in the non-security mode.
(66) Next, based on the above description, a method of changing a processing method when a security policy is violated in the non-security mode will be described.
(67) A process or a service corresponding to a subject which processes an operation according to whether the security policy is violated in the non-security mode may be set by a domain to be accessed in advance, that is, according to whether the security mode or the non-security mode is used. The setting may be stored in a predetermined file or received from an external device such as a server.
(68) Each of the subjects has a label defining an access authority for an object which the subject desires to use, that is, a file or a folder, and the label may be compressed or converted to a policy file and then stored in a preset area of the memory 105.
(69) Accordingly, the object set to be used in the security mode, for example, a DataBase (DB), a file, a folder, or/and an application may be accessed by a particular process or service or the user in the security mode. In this event, the security mode management process 215 for managing the access detects an access violation action with reference to the policy file.
(70) Accordingly, when a particular process violates a policy, the security mode management process 215 controls to display a simple denial popup message 410 or a complex inquiry denial popup message 420 on the display unit 106 according to a set mode. Embodiments of the present invention include the following six modes.
(71) 1. Enforcing Mode 1 use notification: forcibly prohibit offenses and inform every violation
(72) 2. Enforcing Mode 2 use notification: forcibly prohibit offenses and do not inform
(73) 3. Enforcing Mode 3 use notification: forcibly prohibit only this behavior
(74) 4. Permissive Mode 1 use notification: inform user but do not forcibly prohibit
(75) 5. Permissive Mode 2 use notification: do not inform user and only perform logging
(76) 6. Permissive Mode 3 use notification: no action
(77) With the output of the above listed popup messages, a sound, a vibration or/and transmission of a message informing another electronic device such as a server of the corresponding situation may be also used.
(78)
(79) When the security mode app store process 211 is executed, the security mode app store process 211 executes the app store process 201 of the non-security mode in step 500. At this time, since the app store process 201 of the non-security mode is required to access an app store by the app store process 211 of the security mode, the app store process 201 of the non-security mode controls the communication module 110 to access a server having an app for the security mode in the app store, receives a list of security apps which can be installed, and displays information of the received list on the display unit 106 in step 502.
(80) When a particular security app is required to be installed, that is, when a predetermined security app is required to be downloaded and installed by a command of the user or a particular server, the app store process 201 controls the communication module 110 to receive the security app from the corresponding server and provides the received security app to the management agent process 205 in step 504.
(81) When all app data to be installed are received from the server having the security app, the management agent process 205 may ask for installation while providing the app data to be installed to the security mode management process 215 existing in the security mode in operation 506.
(82) Accordingly, the security mode management process 215 installs the app through step 508 to generate a new security mode app process 216. Thereafter, the security mode management process 215 informs the user that the app has been installed. When the user mode is the non-security mode, the security mode management process 215 provides only information informing that the app has been installed to the notification message process 220 or the security mode notification proxy process 221. Accordingly, the notification message process 220 or the security mode notification proxy process 221 may display an indication that the process has been installed on the display unit 106.
(83)
(84) Processes illustrated in
(85) Accordingly, a first dummy process 611 and a second dummy process 612 of the security mode both correspond to dummy interfaces and may be processes performing only an operation for calling processes operating in the non-security mode. That is, the first dummy process 611 is a dummy process for calling a first dummy corresponding process 601 and the second dummy process 612 is a process for calling a second dummy corresponding process 602.
(86) An actual operation is performed by the first dummy corresponding process 601 and the second dummy corresponding process 602. The processes may be, for example, a contact process, a calendar process, a clipboard process, a call processing log process, a dialer process, a message (SMS/MMS) process, or the like.
(87) The dummy process corresponds to a one-way bridge for a connection of the process of the non-security mode and may be configured to operate only when a function of the non-security mode is attempted to be used in the security mode. Further, when the user executes the corresponding process, the dummy process is configured to perform a function of the non-security mode by calling the corresponding process provided in the non-security mode through the bridge. At this time, the dummy process may be configured to use a database included only in the security mode while performing the function of the non-security mode, as necessary.
(88) Then, each of the above mentioned processes will be described in more detail. The contact process provides only basic information such as a phone number, a name, and a group when the contact process is called by the dummy process. Accordingly, information such as a speed dial, a photo ID, and a profile may be loaded, and the privacy of the user may be protected in the security mode. Further, when the contact process is called by the dummy process of the security mode, an editing of data read from the database may be impossible.
(89) The calendar process is configured to only read basic information such as a subject and time when the corresponding data is shared. The clipboard performs the same operation in both the security mode and the non-security mode. However, data stored in the clipboard in the non-security mode may not be read in the security mode and data stored in the clipboard in the security mode may not be read in the non-security mode.
(90) The call processing log process reads log information of an outgoing call and an incoming call from a call processing log database 621 equally in the security mode and the non-security mode. In
(91) Further, the dialer process is configured to perform a dialing equally in the security mode as well as in the non-security mode.
(92) An alarm process 622 operates equally in the security mode as well as in the non-security mode. Accordingly, as illustrated in
(93)
(94) Referring to
(95) The electronic device according to an embodiment of the present invention may operate in one of a plurality of operation modes including a first operation mode and a second operation mode. For example, the first operation mode may be a mode set to encrypt data and store the encrypted data in a memory area which is separated from the remaining other operation modes (for example, second operation mode) and allocated to the first operation mode, to allow only an authenticated user to access the data stored in the memory area allocated to the first operation mode.
(96) The notification recognition module 701 generates notification information to recognize the notification information of a first mode process activated in the first operation mode of the plurality of operation modes.
(97) For example, at least a part or all of the notification recognition module 701 may be included in the first mode process having the generated notification information.
(98) The notification module 702 is set to provide a notification to the user of the electronic device based on a part of the notification information generated in the notification recognition module 701 when a current operation mode is not the first operation mode. For example, the part of the notification information notified by the notification module 702 may include at least one of whether the notification information has been generated, a type of the generated notification information, a number of times that the notification information has been generated, and an amount of data included in the notification information.
(99) For example, at least a part or all of the notification module 702 may be included in the first mode process having the generated notification information.
(100) The notification module 702 is set to process a part of the notification information in various types and transmit the processed notification information to the user. For example, the part of the notification information may be displayed on at least a part of a display screen of the electronic device. Further, the notification may be provided to the user in various types, such as a notification sound, and a notification vibration as well as such a visual notification. The notification module according to the present invention does not limit a notification method itself.
(101) The processor 700 executes at least one of the notification recognition module 701 and the notification module 702.
(102) When an access request for resources set to be accessible only in the first operation mode is detected, the access control module 703 is set to block the access request if the current operation mode is not the first operation mode.
(103) In some implementations, the access control module 703 may be set to display a message indicating that the access request has been blocked on the display screen of the electronic device.
(104) In some implementations, the access control module 703 may be set to provide an authentication method to access the first operation mode and allow the access request of the user if the corresponding user succeeds in the authentication according to the provided authentication method.
(105)
(106) Referring to
(107) In step 802, the processor 700 of the electronic device executes the notification module 702 to give a notification to the user based on a part of the notification information generated in the first operation mode process if the current operation is not the first operation mode.
(108) In step 802, the processor 700 processes a part of the notification information in various types and transmits the processed notification information to the user. For example, the part of the notification information may be displayed on at least a part of a display screen of the electronic device. Further, the notification may be provided to the user in various types, such as a notification sound, and a notification vibration as well as such a visual notification. The notification module according to the present invention does not limit a notification method.
(109) Each of the operations described in this specification may be processed through a sequential, parallel, repetitive, or heuristic method and some of the operations may be omitted or other operations may be added.
(110) The method according to the present invention as described above may be implemented as a program command which can be executed through various computers and recorded in a computer-readable recording medium. The recording medium may include a program command, a data file, and a data structure. The program command may be specially designed and configured for the present invention or may be used after being known to those skilled in computer software fields. The recording medium may include magnetic media such as a hard disk, a floppy disk and a magnetic tape, optical media such as a Compact Disc Read-Only Memory (CD-ROM) and a Digital Versatile Disc (DVD), magneto-optical media such as a floptical disk, and hardware devices such as a Read-Only Memory (ROM), a Random Access Memory (RAM) and a flash memory. Further, the program command may include a machine language code generated by a compiler and a high-level language code executable by a computer through an interpreter and the like. The hardware devices may be configured to operate as one or more software modules to realize the present invention.
(111) Each of the modules disclosed in this specification may be configured by software, firmware, hardware, or a combination thereof. Further, some of the modules may be combined as one module or omitted. When they are combined, functions which have been performed by the corresponding modules before the combination may be equally performed.
(112) While the present invention has been particularly shown and described with reference to certain embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims and their equivalents