Abstract:
A security method based on a memory unit for a user is provided. The security method includes receiving, from a server, a security code including a security service command for the user terminal and verification information certifying the security service command; determining whether the received verification information matches verification information stored in the memory unit; and performing, by the memory unit, a security action corresponding to the security service command, when the received verification information matches the stored verification information.
Abstract:
A system on chip structured in a second network device is provided. The system on chip includes: a first resource which is structured as at least one of hardware and software; a resource management module; and a processor configured to control or execute the resource management module to monitor a state of the first resource, and manage a sharing condition of the first resource to be shared by a first network device and the second network device and shared information of at least one second resource which is hardware and/or software, currently shared by the second network device and a third network device.
Abstract:
An Internet of Things module includes a memory including a boot area for storing boot firmware and first security information and a security area for storing a firmware release version and second security information, and a processor to perform a boot process of the Internet of Things module using the boot firmware in the boot area and to determine whether the boot process of the Internet of Things module is progressed or stopped through comparing the first security information in the boot area with the second security information in the security area and through comparing a version of the boot firmware in the boot area with the firmware release version in the security area.
Abstract:
A data management method includes decrypting the first encryption key using the second encryption in response to receiving the first encryption key, decrypting the data by using the first encryption key in response to receiving the data encrypted with the first encryption key, and encrypting the data with the third encryption key and transmitting the data externally.
Abstract:
A security domain management method and apparatus for managing at least one security domain in a trusted execution environment (TEE) including at least one security domain is provided. The method includes obtaining information related to an event for an arbitrary security domain when the event for the arbitrary security domain is generated; and transmitting the information related to the event to at least one other security domain, wherein the information related to the event is sent via a TEE kernel.