Abstract:
A data protection method and apparatus that can protect data through encryption using a Boolean function is provided. The data protection method includes applying an inverse affine transformation to data to be encrypted using a Boolean function; applying round operations of an Advanced Encryption Standard (AES) cryptographic algorithm to the inverse-affine transformed data; and producing ciphertext data by applying an affine transformation to the result of the round operations.
Abstract:
A method for operating an electronic device is provided. The method includes executing, by a processor of the electronic device operable in a first mode (e.g. a trusted execution environment (TEE)) or a second mode (e.g. a non-trusted execution environment (NTEE)), wherein the first mode is more secure than the second mode; receiving, by the processor operating in the first mode, data or information related to a first software program stored in a first memory region; and authenticating, by the processor operating in the first mode, at least a portion of the data or information using a second software program stored in a second memory region.
Abstract:
A first electronic device according to various embodiments of the disclosure may include: a communication circuit, and at least one processor. The at least one processor may be configured to: receive, through the communication circuit, a first public key and a first request for a first symmetric key from a second electronic device, encrypt the first symmetric key using the first public key, transmit, through the communication circuit, the encrypted first symmetric key to the second electronic device, generate at least one second symmetric key corresponding to at least one object, encrypt the at least one object using the generated at least one second symmetric key, encrypt each of the at least one second symmetric key using the first symmetric key, and transmit, through the communication circuit, the encrypted at least one object and the encrypted at least one second symmetric key to the second electronic device.
Abstract:
A method and an electronic device are disclosed herein. The electronic device includes a communication unit, a storage unit and at least one processor, which executes the method, including detecting a request for establishing a call session, generating a new security key from a preset security key, renewing the preset security key by setting the generated new security key as a current preset security key, and establishing the call session based on the generated new security key.
Abstract:
A method and an apparatus for controlling an electronic device is provided. The method and an apparatus for operating a function by detecting a touch area in which a touch is input by a user in an electronic device capable of receiving a touch input are provided. A method of controlling an electronic device includes detecting a touch inputted to the electronic device, determining whether the touch is a palm touch based on information related to the touch, and when the touch is determined to be the palm touch, controlling an output of data provided by the electronic device based on a change in a palm touch area of the palm touch.
Abstract:
An electronic device has a flexible display. An apparatus and method for providing the electronic device includes: a display unit formed of flexible material having at least one curved surface, a transformation unit coupled to at least part of the display unit, and a control unit configured to alter the transformation unit to deform the at least one curved surface of the flexible material of the display unit.
Abstract:
A method for connecting an electronic device using an eye-tracking technique and an electronic device that implements the method are provided. The method includes acquiring eye-tracking information, obtaining image information corresponding to the eye-tracking information, comparing the image information with specific information about at least one external device, and based on the comparison, determining a specific external device to be connected from among the at least one external device.
Abstract:
A method of operating data security and an electronic device supporting the same are provided. The method includes executing a general Application (App) based on a non-trusted execution module; executing a first trusted App related to the execution of the general App based on a trusted execution module; generating a message by encrypting data generated in the first trusted App; transmitting the encrypted message to the general App; and transmitting the encrypted message to a second trusted App related to the execution of the general App and executed based on the trusted execution module.
Abstract:
A method of operating data security and an electronic device supporting the same are provided. The method includes executing a general Application (App) based on a non-trusted execution module; executing a first trusted App related to the execution of the general App based on a trusted execution module; generating a message by encrypting data generated in the first trusted App; transmitting the encrypted message to the general App; and transmitting the encrypted message to a second trusted App related to the execution of the general App and executed based on the trusted execution module.