METHOD FOR AUTHENTICATING USER AND ELECTRONIC DEVICE ASSISTING SAME

An electronic device according to various embodiments of the present disclosure includes: at least one sensor; a communication circuit; at least one processor operably coupled with the at least one sensor and the communication circuit; and at least one memory operably coupled with the at least one p...

Full description

Saved in:
Bibliographic Details
Main Authors PARK, Jiyoung, SHIN, Minsoo, CHOI, Yongha, CHOI, Wonjung, YEOM, Donghyun, LEE, Dasom, HONG, Jihee, YOU, Heejun, CHANG, Moonsoo
Format Patent
LanguageEnglish
French
German
Published 15.06.2022
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:An electronic device according to various embodiments of the present disclosure includes: at least one sensor; a communication circuit; at least one processor operably coupled with the at least one sensor and the communication circuit; and at least one memory operably coupled with the at least one processor, wherein the memory may store instructions which, when executed, cause the processor to: receive a request for authenticating a user of the electronic device using a designated authentication method; identify whether a device set as a reference device is a first device among the first device and a second device which are included in the at least one sensor and the communication circuit, and are capable of generating authentication data required for using the designated authentication method to authenticate the user; generate data, when 1-1 authentication data for authenticating the user is acquired from the first device, indicating a 1-1 time point at which the processor acquired the 1-1 authentication data; generate data, when 2-1 authentication data for authenticating the user is acquired from the second device, indicating a 2-1 time point at which the processor acquired the 2-1 authentication data; confirm, based on the data indicating the 1-1 time point and the data indicating the 2-1 time point, whether the 2-1 time point is within a threshold time range based on the 1-1 time point; and authenticate the user using the 1-1 authentication data and the 2-1 authentication data based on whether the 2-1 time point is within the threshold time range based on the 1-1 time point.
Bibliography:Application Number: EP20200798793