Abstract:
Disclosed herein are a method and electronic device for enhancing the security of sensitive operations. Control is switched from a first driving area to a second driving area of at least one processor. Security authentication is performed by the second driving area and a result of the authentication is output.
Abstract:
A method for operating an electronic device is provided. The method includes executing, by a processor of the electronic device operable in a first mode (e.g. a trusted execution environment (TEE)) or a second mode (e.g. a non-trusted execution environment (NTEE)), wherein the first mode is more secure than the second mode; receiving, by the processor operating in the first mode, data or information related to a first software program stored in a first memory region; and authenticating, by the processor operating in the first mode, at least a portion of the data or information using a second software program stored in a second memory region.