Abstract:
The disclosure relates to an electronic device for generating a mnemonic phrase of a private key and an operation method in the electronic device. The electronic device may comprise a memory, a display module, and at least one processor electrically connected with the memory and the display module. The at least one processor may be configured to generate a private key and a public key, generate a first mnemonic phrase including a designated first number of words based on a structure of the private key, identify a user phrase input by a user, generate a second mnemonic phrase including a second number of words identified based on a security level obtained by analyzing the user phrase, and control the display module to display the generated second mnemonic phrase. Other embodiments are possible.
Abstract:
An electronic device and a method of operating the electronic device are provided. Data corresponding to a user input is received through a user interface of the electronic device. The data is stored in a normal area of a memory of the electronic device. A quantity of information in the stored data is identified. At least one key is selected from a plurality of keys stored in the memory, based on at least the quantity of information. The data is encrypted using the at least one key. The encrypted data and information indicating the at least one key are transmitted to a secure area of the memory, which requires access authority.
Abstract:
A method of managing keys and an electronic device adapted to the method are provided. The method includes creating a first key, based on information included in a memory space of a processor, creating a second key, based on at least one item of user information, and creating a third key that was created through at least one encryption process, based on the created first key and the created second key.
Abstract:
A method and an apparatus for controlling a lock state of an electronic device, and a system therefor are provided. The method includes signing a lock state update request by using a unique key loaded in a confidence region of the electronic device when a lock state change is requested, generating a lock state control request message including the lock state update request, the signed lock state update request, and a certificate of the electronic device, transmitting the generated lock state control request message to a service provider server, and authenticating a lock state update command in a communication processor of the electronic device and updating a state of the communication processor according to the lock state update command when the lock state update command is received from the service provider server.
Abstract:
A method and apparatus for protecting the integrity of a mobile terminal are provided. The mobile terminal includes a secure world for preventing unauthorized access to resources, and a normal world other than the secure world. The integrity protection method for the mobile terminal includes sensing a power-on of the mobile terminal, verifying, by a trusted entity in the normal world, the integrity of a first subsequent entity, and sending, when an integrity breach is detected in the first subsequent entity, by the trusted entity, a modification indication signal to the secure world.
Abstract:
An electronic device is provided. The electronic device includes a communication module for supporting near-field wireless communication, memory, and at least one processor operatively connected to the communication module and the memory. The memory stores one or more programs including instructions that, when executed by the at least one processor, may cause the electronic device to establish near-field wireless communication connection with an external device through the communication module, generate a first private key by using a determined random function, generate a first public key based on the first private key, generate a first certificate including a security level of the electronic device with respect to the first public key, and transmit the generated first certificate to the external device through the communication module.
Abstract:
An electronic device is provided. The electronic device includes a display, a memory, and a processor operatively connected to the display and the memory, wherein the processor can be configured to detect an access event, occurring through an application, for a resource of the electronic device, acquire an application execution screen image in response to the detection of the access event, map the acquired application execution screen image with event information indicating the access event and store same, and display, on the basis of a user input, a first screen image including the event information and the application execution screen image mapped with the event information on the display.
Abstract:
An electronic device and method are disclosed for managing a non-fungible token (NFT). The electronic device includes: a memory configured to store computer-executable instructions, and a processor. The processor implements the method, including: generating, a NFT for target content in response to receiving a request to register the target content from a first external electronic device, generating, for the NFT, a certification authority (CA) signature indicating that the NFT is generated by the server, and transmitting, via a communication circuitry, the NFT to the first external electronic device, wherein an ownership signature is added to the NFT, together with the CA signature, the ownership signature based on a private key of a user to which ownership of the NFT is assigned.
Abstract:
According to certain embodiments, an electronic device comprises: a memory storing an interface and an application; a processor; and a secure module physically separated from the processor and including a secure processor and a secure memory, wherein the processor is configured to: obtain user authentication information, through the interface; attempt user authentication, based on the user authentication information; obtain data stored in the secure memory when the user authentication succeeds; store a first token including a first valid duration for an access to the secure memory, the obtained data, and a first key value for decoding the obtained data in a buffer; and delete the first token and the first key value from the buffer when the first valid duration expires.
Abstract:
An electronic device and permission control method are disclosed. The electronic device includes a display, a communication circuitry, a memory and a processor. The processor implements the method, including: receiving a first evaluation regarding usage of an access permission by at least one application from a server, via the communication circuitry, generating usage information indicating historical usage of the access permission by the at least one application, generating a second evaluation of the access permission granted to the at least one application, based at least on the usage information, determining an evaluation result based on at least one of the first evaluation or the second evaluation, and determining whether to display a user notification regarding the access permission, based on the evaluation result.