Abstract:
An image processing system may include a first image sensor, a second image sensor, and an image processing device. The image processing device may be configured to obtain a first image and a second image by respectively processing the first image data and the second image data. The image processing device may output an image based on the first image when a zoom factor of the output image is lower than a first reference value, generate a correction image by correcting locations of second reference coordinates of the second image based on first reference coordinates of the first image when the zoom factor of the output image is between the first reference value and the second reference value, and may output an image based on the second image when the zoom factor exceeds the second reference value.
Abstract:
A method of operating a mobile device comprises executing a trusted service application in a trusted operating system through secure access, executing a trusted web server module in the trusted operating system, wherein the trusted web server module is configured to transfer information using an internet protocol and the information is generated by execution of the trusted service application, and executing a user application in a rich operating system through normal access, wherein the user application is configured to relay communication between a remote web server and the trusted web server module through a security session.
Abstract:
A method of operating a mobile device comprises executing a trusted service application in a trusted operating system through secure access, executing a trusted web server module in the trusted operating system, wherein the trusted web server module is configured to transfer information using an internet protocol and the information is generated by execution of the trusted service application, and executing a user application in a rich operating system through normal access, wherein the user application is configured to relay communication between a remote web server and the trusted web server module through a security session.
Abstract:
An image processing system may include a first image sensor, a second image sensor, and an image processing device. The image processing device may be configured to obtain a first image and a second image by respectively processing the first image data and the second image data. The image processing device may output an image based on the first image when a zoom factor of the output image is lower than a first reference value, generate a correction image by correcting locations of second reference coordinates of the second image based on first reference coordinates of the first image when the zoom factor of the output image is between the first reference value and the second reference value, and may output an image based on the second image when the zoom factor exceeds the second reference value.
Abstract:
An image processing system may include a first image sensor, a second image sensor, and an image processing device. The image processing device may be configured to obtain a first image and a second image by respectively processing the first image data and the second image data. The image processing device may output an image based on the first image when a zoom factor of the output image is lower than a first reference value, generate a correction image by correcting locations of second reference coordinates of the second image based on first reference coordinates of the first image when the zoom factor of the output image is between the first reference value and the second reference value, and may output an image based on the second image when the zoom factor exceeds the second reference value.
Abstract:
An access control method for accessing an embedded system includes: performing a first access control operation for an access system by a first authentication subject, wherein the first access control operation includes performing a first authentication for the access system; when the first access control operation is passed, receiving at the first authentication subject a result of a second access control operation for the access system which is performed by a second authentication subject that is separate from the first authentication subject performing a second authentication for authenticating whether the access system is an access system that is authenticated by a second authentication subject that is separate from the first authentication subject, and receiving the result of the authentication; and allowing the access system to access the embedded system if the first authentication and the second authentication are successful.
Abstract:
A method of operating a mobile device comprises executing a trusted service application in a trusted operating system through secure access, executing a trusted web server module in the trusted operating system, wherein the trusted web server module is configured to transfer information using an internet protocol and the information is generated by execution of the trusted service application, and executing a user application in a rich operating system through normal access, wherein the user application is configured to relay communication between a remote web server and the trusted web server module through a security session.