Abstract:
A washing machine includes: a main body including: a first tub; a washing tub rotatable inside the first tub; a laundry inlet through which laundry is loaded into the washing tub; and a door configured to open and close the laundry inlet; and a manipulation panel assembly configured to: receive a manipulation input for wash settings or spin-drying settings; and display an operation state of the washing machine. The manipulation panel assembly includes: a display board; a jog board on which a jog switch is mounted; a first connector on any one of the display board and the jog board, and coupled to the other one of the display board and the jog board; and a manipulation panel accommodating the display board and the jog board.
Abstract:
An operation panel assembly of the disclosure includes a first cover including a first front portion defining an opening and a first side portion extending from the first front portion, wherein the first front portion and the first side portion form a first accommodation space, an operation panel board including a first surface on which an electronic component aligned with the opening of the first cover is disposed, and a second surface opposite to the first surface and arranged in the first accommodation space so that the first surface faces the first front portion, and a second cover coupled to the first cover to close the first accommodation space.
Abstract:
A method and a device for authenticating a process in a computing device allowing an application loaded into a memory to operate as a process are provided. The method includes receiving a message requesting authentication of the process, acquiring unique information of the process from an operating system of the process in response to the message requesting authentication of the process, comparing the acquired unique information with unique information previously stored in a memory, and determining that the authentication of the process has succeeded, when the acquired unique information coincides with the unique information previously stored.
Abstract:
A user terminal is provided. The user terminal includes an input interface configured to receive a user input of requesting initialization of a password of a basic input output system (BIOS) of the user terminal, and receive a decrypted string obtained by decrypting a ciphertext for initialization in response to the initialization request being verified based on verification information from a server, memory storing one or more computer programs, and one or more processors communicatively coupled to the input interface and the memory, wherein the one or more computer programs include computer-executable instructions that, when executed by the one or more processors individually or collectively, cause the user terminal to generate the ciphertext by encrypting a predetermined length of random string in response to the user input, and initialize the password of the BIOS according to whether a second hash value for the decrypted string and a first hash value for the random string match.
Abstract:
The present disclosure provides an electronic device including a touch screen display, at least one processor, and a memory, in which the memory stores a first application program including a user interface, and stores instructions that, with regard to execution of the first application, cause the at least one processor to execute the first application program, and display content on the touch screen display in response to the execution of the first application program, receive a first user input for selecting at least a portion of the content using the user interface, receive a second user input for adding at least a portion of the selected content to a clipboard using the user interface, check whether or not the application program associated with the second user input is the first application program, and allow or block the addition of the selected content to the clipboard based at least in part on the check. In addition to the above, various embodiments identified through the specification are possible.
Abstract:
A method and an apparatus that may safely secure data in an electronic device including a computing resource, that is, software (for example, an operating system) and hardware (for example, a memory and a Central Processing Unit (CPU)) for operating the electronic device are provided. The method includes receiving a request for an application key from a data generation application or a proxy application that executes encryption of data in place of the data generation application, generating an application key using an application Identification (ID) corresponding to the data generation application and a security key stored in a secure area of the electronic device, in response to the request, and encrypting data using the generated application key.