Abstract:
A terminal, a cloud apparatus, a method of analyzing, by a terminal, activities of a user, and a method of analyzing, by a cloud apparatus, activities of a user. The terminal includes a communication interface that communicates with an external apparatus over a network; a controller that obtains data used to predict activities of a user and anonymize a portion of the obtained data, and transmit the anonymized data and a remaining portion of the data, which is not anonymized, to the external apparatus through the communication interface; and a display that displays notification information related to the activities of the user based on activity prediction data received from the external apparatus, the activity prediction data being generated based on an analysis of the transmitted data.
Abstract:
Provided are a first device for transmitting data, a second device for receiving data, and a system including the same. The first device includes: a controller configured to obtain biometric information of the second user; and a transceiver configured to transmit, to the device of the second user, the data and to transmit, to the device of the second user, the obtained biometric information to control an access to the data by the second user.
Abstract:
Provided are an electronic device and a method of controlling same. The method of controlling the electronic device: displays a UI including a security index showing that the electronic device is in a state operating in a secure mode; compares the security index to a reference security index and determines whether the security index has been falsified; and when the security index is a falsified security index, shows that the security index is a security index that has been falsified.
Abstract:
Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured to transmit, to a server, an encryption key generation request with respect to the folder, and receive, from the server, an encryption key associated with the folder that is generated in response to the encryption key generation request, wherein the encryption key generation request includes an identification of the folder and authentication data of a user who accesses the folder is an authorized user; and a controller configured to authenticate the user by using the encryption key.
Abstract:
Provided are a system and method of encrypting a folder in a device. The device for controlling access to the folder includes a communication part configured to transmit, to a server, an encryption key generation request with respect to the folder, and receive, from the server, an encryption key associated with the folder that is generated in response to the encryption key generation request, wherein the encryption key generation request includes an identification of the folder and authentication data of a user who accesses the folder is an authorized user; and a controller configured to authenticate the user by using the encryption key.
Abstract:
A first device requesting a second device to execute a task is provided. The first device includes a communication unit configured to communicate with the second device and a processor configured to transmit content for executing the task to the second device through the communication unit as an event for requesting execution of the task is generated, and receive result data obtained as the second device executes the task through the communication unit.
Abstract:
Provided are an electronic apparatus in which a normal operating system (OS) and a secure OS are installed and a method for controlling the electronic apparatus. The method for controlling the electronic apparatus includes searching for at least one external terminal in which a secure OS is installed, selecting a first terminal from among the at least one external terminal in which a secure OS is installed, in response to a first terminal being selected from the retrieved at least one external terminal, performing communication connection with the first terminal, searching for at least one terminal in which only a normal OS is installed, from among at least one external terminal that is capable of being communication-connected to the first terminal, and performing communication with a second terminal of the at least one terminal in which only the normal OS is installed, through the first terminal.