Abstract:
An electronic device according to various embodiments of the present invention can comprise: a housing including a first plate, a second plate, and a side member surrounding the space between the first plate and the second plate; a processor arranged in the space; a display exposed through a part of the first plate; a communication circuit arranged in the space; a piezoelectric actuator arranged in the space and providing vibration to the first plate; a speaker arranged in the space near the edge of the first plate; an audio processing circuit arranged in the space and electrically connected to the piezoelectric actuator and the speaker; and a memory arranged in the space and electrically connected to the processor. According to various embodiments, when instructions, which can be included by the memory, are executed, the processor wirelessly connects to an external device by using the communication circuit, receives an audio signal through the communication circuit, and provides the audio signal to the audio processing circuit. According to various embodiments, the side member can be separated from or integrated with the second plate. According to various embodiments, the audio processing circuit can provide, to the piezoelectric actuator, a first signal having a first frequency band and can provide, to the speaker, a second frequency band lower than the first frequency band, on the basis of at least a part of the audio signal. Additional various embodiments are possible.
Abstract:
A method for providing a security function includes obtaining a request for executing a function of application through an electronic device if the electronic device is located within a predetermined distance from a user, identifying a success or failure of a first authentication which is previously performed for the user in response to the request, and determining whether to perform a second authentication for executing the function of the application based on the success or failure of the first authentication, wherein determining whether to perform the second authentication comprises performing the second authentication by using a security level lower than a security level related to the first authentication if the success of the first authentication is identified. An electronic device includes a processor configured to determine a success or failure of a first authentication, and decide whether to perform a second authentication with a second security level for executing the function.
Abstract:
An unmanned aerial vehicle (UAV) may include: a flight body; a camera installed on the flight body; a sensor module mounted inside the flight body to sense nearby surroundings; a wireless communication module mounted inside the flight body to wirelessly communicate with an external communication device; a processor mounted inside the flight body and electrically connected with the camera, the sensor module, and the wireless communication module; and a memory electrically connected with the processor. The memory may store instructions that, when the unmanned aerial vehicle is in flight, cause the processor to: identify a first geofence region; broadcast flight information on a periodic basis; receive flight information from a second unmanned aerial vehicle in flight; determine whether there is an overlap between the first geofence region and a second geofence region of the second unmanned aerial vehicle; and if so, reset the first geofence region so that the first geofence region does not overlap with the second geofence region.
Abstract:
An electronic device and method are disclosed, including a communication interface adapted to allow communicative coupling with a plurality of electronic devices, and a processor, implementing the method, which includes: identifying an application to be executed in the first electronic device, selecting candidate devices from the plurality of electronic devices having at least one function associated with execution of the application, selecting a second electronic device from among the candidate devices based a factor including at least one of: status information of each of the candidate devices, position information of each of the candidate devices in relation to at least one of a user or the first electronic device, and at least one property of data associated with the at least one function of the candidate devices, and executing the application in the first electronic device utilizing the at least one function of the second electronic device.
Abstract:
A method for providing a security function includes obtaining a request for executing a function of application through an electronic device if the electronic device is located within a predetermined distance from a user, identifying a success or failure of a first authentication which is previously performed for the user in response to the request, and determining whether to perform a second authentication for executing the function of the application based on the success or failure of the first authentication, wherein determining whether to perform the second authentication comprises performing the second authentication by using a security level lower than a security level related to the first authentication if the success of the first authentication is identified. An electronic device includes a processor configured to determine a success or failure of a first authentication, and decide whether to perform a second authentication with a second security level for executing the function.
Abstract:
A method for controlling functions according to a distance measurement between electronic devices and an electronic device implementing the same are disclosed. The method includes transmitting a sound transmission command from a first electronic device to a second electronic device; measuring a distance between the first electronic device and the second electronic device by identifying sound information and reception of sound transmitted from the second electronic device to the first electronic device; and comparing the measured distance and a predetermined user area, and deciding performance of a predefined function corresponding to the user area in the first electronic device.
Abstract:
A mobile electronic device and navigation method thereof. An electronic device of the present disclosure includes a communication module, a camera module, a sensor module, a driving module, a memory, and a processor that is functionally connected to the communication module, the camera module, the sensor module, the driving module, and the memory, the processor determining at least one service and a goal location of the electronic device for providing the at least one service, planning a path towards the goal location, and controlling the electronic device to move along the path. However, other embodiments are possible as well.
Abstract:
A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus includes detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus, in response to the access request, executing an access control module included in a second area of the memory to calculate a hash value of the application by the processor, determining whether a record exists in the memory, the record corresponding to the hash value and identification information of the application, by executing the access control module by the processor, and allowing access to the resource by the processor when the record exists in the memory.
Abstract:
A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus includes detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus, in response to the access request, executing an access control module included in a second area of the memory to calculate a hash value of the application by the processor, determining whether a record exists in the memory, the record corresponding to the hash value and identification information of the application, by executing the access control module by the processor, and allowing access to the resource by the processor when the record exists in the memory.
Abstract:
A method of managing keys and an electronic device adapted to the method are provided. The method includes creating a first key, based on information included in a memory space of a processor, creating a second key, based on at least one item of user information, and creating a third key that was created through at least one encryption process, based on the created first key and the created second key.