Abstract:
A method of managing keys and an electronic device adapted to the method are provided. The method includes creating a first key, based on information included in a memory space of a processor, creating a second key, based on at least one item of user information, and creating a third key that was created through at least one encryption process, based on the created first key and the created second key.
Abstract:
A method and apparatus for protecting the integrity of a mobile terminal are provided. The mobile terminal includes a secure world for preventing unauthorized access to resources, and a normal world other than the secure world. The integrity protection method for the mobile terminal includes sensing a power-on of the mobile terminal, verifying, by a trusted entity in the normal world, the integrity of a first subsequent entity, and sending, when an integrity breach is detected in the first subsequent entity, by the trusted entity, a modification indication signal to the secure world.
Abstract:
A first electronic device according to various embodiments of the disclosure may include: a communication circuit, and at least one processor. The at least one processor may be configured to: receive, through the communication circuit, a first public key and a first request for a first symmetric key from a second electronic device, encrypt the first symmetric key using the first public key, transmit, through the communication circuit, the encrypted first symmetric key to the second electronic device, generate at least one second symmetric key corresponding to at least one object, encrypt the at least one object using the generated at least one second symmetric key, encrypt each of the at least one second symmetric key using the first symmetric key, and transmit, through the communication circuit, the encrypted at least one object and the encrypted at least one second symmetric key to the second electronic device.
Abstract:
An unmanned aerial vehicle (UAV) may include: a flight body; a camera installed on the flight body; a sensor module mounted inside the flight body to sense nearby surroundings; a wireless communication module mounted inside the flight body to wirelessly communicate with an external communication device; a processor mounted inside the flight body and electrically connected with the camera, the sensor module, and the wireless communication module; and a memory electrically connected with the processor. The memory may store instructions that, when the unmanned aerial vehicle is in flight, cause the processor to: identify a first geofence region; broadcast flight information on a periodic basis; receive flight information from a second unmanned aerial vehicle in flight; determine whether there is an overlap between the first geofence region and a second geofence region of the second unmanned aerial vehicle; and if so, reset the first geofence region so that the first geofence region does not overlap with the second geofence region.
Abstract:
An electronic device has a flexible display. An apparatus and method for providing the electronic device includes: a display unit formed of flexible material having at least one curved surface, a transformation unit coupled to at least part of the display unit, and a control unit configured to alter the transformation unit to deform the at least one curved surface of the flexible material of the display unit.
Abstract:
A method and an apparatus for controlling an electronic device is provided. The method and an apparatus for operating a function by detecting a touch area in which a touch is input by a user in an electronic device capable of receiving a touch input are provided. A method of controlling an electronic device includes detecting a touch inputted to the electronic device, determining whether the touch is a palm touch based on information related to the touch, and when the touch is determined to be the palm touch, controlling an output of data provided by the electronic device based on a change in a palm touch area of the palm touch.
Abstract:
A data protection method and apparatus that can protect data through encryption using a Boolean function is provided. The data protection method includes applying an inverse affine transformation to data to be encrypted using a Boolean function; applying round operations of an Advanced Encryption Standard (AES) cryptographic algorithm to the inverse-affine transformed data; and producing ciphertext data by applying an affine transformation to the result of the round operations.
Abstract:
A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus includes detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus, in response to the access request, executing an access control module included in a second area of the memory to calculate a hash value of the application by the processor, determining whether a record exists in the memory, the record corresponding to the hash value and identification information of the application, by executing the access control module by the processor, and allowing access to the resource by the processor when the record exists in the memory.