INTEGRITY PROTECTION METHOD AND APPARATUS FOR MOBILE TERMINAL
    12.
    发明申请
    INTEGRITY PROTECTION METHOD AND APPARATUS FOR MOBILE TERMINAL 有权
    完整的保护方法和移动终端的设备

    公开(公告)号:US20130227264A1

    公开(公告)日:2013-08-29

    申请号:US13774435

    申请日:2013-02-22

    CPC classification number: G06F21/575

    Abstract: A method and apparatus for protecting the integrity of a mobile terminal are provided. The mobile terminal includes a secure world for preventing unauthorized access to resources, and a normal world other than the secure world. The integrity protection method for the mobile terminal includes sensing a power-on of the mobile terminal, verifying, by a trusted entity in the normal world, the integrity of a first subsequent entity, and sending, when an integrity breach is detected in the first subsequent entity, by the trusted entity, a modification indication signal to the secure world.

    Abstract translation: 提供了一种用于保护移动终端的完整性的方法和装置。 移动终端包括用于防止对资源的未经授权的访问的安全的世界以及安全世界之外的正常世界。 用于移动终端的完整性保护方法包括:感测移动终端的通电,由正常世界中的可信实体验证第一后续实体的完整性,并且当在第一个中检测到完整性违反时发送 由可信实体将后续实体提供到安全世界的修改指示信号。

    METHOD FOR PROVIDING ENCRYPTED OBJECT AND ELECTRONIC DEVICE FOR SUPPORTING THE SAME

    公开(公告)号:US20220209940A1

    公开(公告)日:2022-06-30

    申请号:US17553145

    申请日:2021-12-16

    Abstract: A first electronic device according to various embodiments of the disclosure may include: a communication circuit, and at least one processor. The at least one processor may be configured to: receive, through the communication circuit, a first public key and a first request for a first symmetric key from a second electronic device, encrypt the first symmetric key using the first public key, transmit, through the communication circuit, the encrypted first symmetric key to the second electronic device, generate at least one second symmetric key corresponding to at least one object, encrypt the at least one object using the generated at least one second symmetric key, encrypt each of the at least one second symmetric key using the first symmetric key, and transmit, through the communication circuit, the encrypted at least one object and the encrypted at least one second symmetric key to the second electronic device.

    UNMANNED AERIAL VEHICLE AND METHOD FOR RECONFIGURING GEOFENCE REGION THEREOF USING ELECTRONIC DEVICE

    公开(公告)号:US20180165970A1

    公开(公告)日:2018-06-14

    申请号:US15834313

    申请日:2017-12-07

    Abstract: An unmanned aerial vehicle (UAV) may include: a flight body; a camera installed on the flight body; a sensor module mounted inside the flight body to sense nearby surroundings; a wireless communication module mounted inside the flight body to wirelessly communicate with an external communication device; a processor mounted inside the flight body and electrically connected with the camera, the sensor module, and the wireless communication module; and a memory electrically connected with the processor. The memory may store instructions that, when the unmanned aerial vehicle is in flight, cause the processor to: identify a first geofence region; broadcast flight information on a periodic basis; receive flight information from a second unmanned aerial vehicle in flight; determine whether there is an overlap between the first geofence region and a second geofence region of the second unmanned aerial vehicle; and if so, reset the first geofence region so that the first geofence region does not overlap with the second geofence region.

    METHOD AND APPARATUS FOR CONTROLLING ELECTRONIC DEVICE USING PALM TOUCH
    16.
    发明申请
    METHOD AND APPARATUS FOR CONTROLLING ELECTRONIC DEVICE USING PALM TOUCH 有权
    使用PALM触摸控制电子设备的方法和装置

    公开(公告)号:US20150130737A1

    公开(公告)日:2015-05-14

    申请号:US14540556

    申请日:2014-11-13

    Abstract: A method and an apparatus for controlling an electronic device is provided. The method and an apparatus for operating a function by detecting a touch area in which a touch is input by a user in an electronic device capable of receiving a touch input are provided. A method of controlling an electronic device includes detecting a touch inputted to the electronic device, determining whether the touch is a palm touch based on information related to the touch, and when the touch is determined to be the palm touch, controlling an output of data provided by the electronic device based on a change in a palm touch area of the palm touch.

    Abstract translation: 提供了一种用于控制电子设备的方法和装置。 提供了通过检测在能够接收触摸输入的电子设备中用户输入触摸的触摸区域来操作功能的方法和装置。 控制电子设备的方法包括检测输入到电子设备的触摸,基于与触摸有关的信息来确定触摸是否是手掌触摸,以及当触摸被确定为手掌触摸时,控制数据的输出 由电子设备基于棕榈触摸手掌触摸区域的改变而提供。

    DATA PROTECTION METHOD AND APPARATUS
    17.
    发明申请
    DATA PROTECTION METHOD AND APPARATUS 有权
    数据保护方法和设备

    公开(公告)号:US20150043731A1

    公开(公告)日:2015-02-12

    申请号:US14455257

    申请日:2014-08-08

    CPC classification number: H04L9/0631 G09C1/00 H04L2209/12

    Abstract: A data protection method and apparatus that can protect data through encryption using a Boolean function is provided. The data protection method includes applying an inverse affine transformation to data to be encrypted using a Boolean function; applying round operations of an Advanced Encryption Standard (AES) cryptographic algorithm to the inverse-affine transformed data; and producing ciphertext data by applying an affine transformation to the result of the round operations.

    Abstract translation: 提供了可以使用布尔函数通过加密来保护数据的数据保护方法和装置。 数据保护方法包括使用布尔函数对待加密的数据应用逆仿射变换; 将高级加密标准(AES)加密算法的轮次操作应用于反仿射变换数据; 以及通过对循环操作的结果应用仿射变换来生成密文数据。

    APPLICATION ACCESS CONTROL METHOD AND ELECTRONIC APPARATUS IMPLEMENTING THE SAME
    18.
    发明申请
    APPLICATION ACCESS CONTROL METHOD AND ELECTRONIC APPARATUS IMPLEMENTING THE SAME 有权
    应用访问控制方法和实现其的电子设备

    公开(公告)号:US20140281501A1

    公开(公告)日:2014-09-18

    申请号:US14205842

    申请日:2014-03-12

    Abstract: A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus includes detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus, in response to the access request, executing an access control module included in a second area of the memory to calculate a hash value of the application by the processor, determining whether a record exists in the memory, the record corresponding to the hash value and identification information of the application, by executing the access control module by the processor, and allowing access to the resource by the processor when the record exists in the memory.

    Abstract translation: 提供了一种实现该方法的电子设备中的访问控制的方法和装置。 操作电子设备的方法包括响应于该访问请求,检测来自电子设备的处理器的包括在存储器的第一区域中的应用对资源的访问请求,执行包括在第二个中的访问控制模块 存储器的区域,通过由处理器执行访问控制模块来计算处理器的应用程序的哈希值,确定存储器中是否存在记录,对应于哈希值的记录和应用的识别信息,以及 当记录存在于存储器中时允许处理器访问资源。

Patent Agency Ranking