Patent application number | Description | Published |
20090022180 | System and method of data verification - A data verification method and system is provided. The data verification method includes the steps of transmitting data from a sender to a receiver over a signaling channel, transmitting a first set of bits to the receiver over a voice channel, wherein the first set of bits is generated using the data in the sender, and verifying the data through comparison between the first set of bits and a second set of bits that is generated based on the data in the receiver. The first and the second sets of bits may be a group of bits that are selected from a hash value using a selection mask in the sender and the receiver respectively, wherein the section mask has the same length as the hash value and the hash value is calculated based on the data, and the selection mask may be pre-defined between the sender and the receiver. | 01-22-2009 |
20100287547 | SYSTEM AND METHOD FOR VERIFYING INTEGRITY OF SOFTWARE PACKAGE IN MOBILE TERMINAL - A method and system for verifying integrity of a software package in a mobile terminal is provided. The method includes receiving a catalog of available software packages from a distributor and displaying the catalog, if a desired software package to be installed is selected from the displayed catalog, acquiring a software package IDentifier (ID) corresponding to the selected software package from the catalog, transmitting the software package ID to the distributor to receive the selected software package corresponding to the software package ID and to transmit the software package ID to a verification authority, receiving, from the verification authority, integrity evidence information corresponding to the software package ID and verifying the integrity of the selected software package, and outputting a notification for notifying a user of a result of the verification and managing the selected software package according to a received user selection. | 11-11-2010 |
20100287598 | METHOD AND SYSTEM FOR PROVIDING SECURITY POLICY FOR LINUX-BASED SECURITY OPERATING SYSTEM - A system for providing security policy for a Linux-based security operating system, which includes a template policy module configured to set an authority using policy information of a downloaded application so that the template policy module can set an access control rule for accessing a system resource of the application, a base policy module executing the access control rule for the system resource in accordance with the access control rule set by the template policy module, and a template policy module editor generating a custom application for the corresponding application using information output from the template policy module. | 11-11-2010 |
20140281501 | APPLICATION ACCESS CONTROL METHOD AND ELECTRONIC APPARATUS IMPLEMENTING THE SAME - A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus includes detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus, in response to the access request, executing an access control module included in a second area of the memory to calculate a hash value of the application by the processor, determining whether a record exists in the memory, the record corresponding to the hash value and identification information of the application, by executing the access control module by the processor, and allowing access to the resource by the processor when the record exists in the memory. | 09-18-2014 |
Patent application number | Description | Published |
20140283006 | APPLICATION AUTHENTICATION METHOD AND ELECTRONIC DEVICE SUPPORTING THE SAME - A method for operating an electronic device is provided. The method includes executing, by a processor of the electronic device operable in a first mode (e.g. a trusted execution environment (TEE)) or a second mode (e.g. a non-trusted execution environment (NTEE)), wherein the first mode is more secure than the second mode; receiving, by the processor operating in the first mode, data or information related to a first software program stored in a first memory region; and authenticating, by the processor operating in the first mode, at least a portion of the data or information using a second software program stored in a second memory region. | 09-18-2014 |
20150046712 | METHOD OF OPERATING DATA SECURITY AND ELECTRONIC DEVICE SUPPORTING THE SAME - A method of operating data security and an electronic device supporting the same are provided. The method includes executing a general Application (App) based on a non-trusted execution module; executing a first trusted App related to the execution of the general App based on a trusted execution module; generating a message by encrypting data generated in the first trusted App; transmitting the encrypted message to the general App; and transmitting the encrypted message to a second trusted App related to the execution of the general App and executed based on the trusted execution module. | 02-12-2015 |
20150121474 | PROCESSOR SECURITY AUTHENTICATION AREA - Disclosed herein are a method and electronic device for enhancing the security of sensitive operations. Control is switched from a first driving area to a second driving area of at least one processor. Security authentication is performed by the second driving area and a result of the authentication is output. | 04-30-2015 |
20150121516 | AUTHENTICATING INPUT IN TRUSTED EXECUTION MODE - Disclosed herein are a method and electronic device for enhancing security authentication. An execution mode may be changed from a non-trusted execution mode to a trusted execution mode. At least one input may be authenticated while in the non-trusted execution mode. | 04-30-2015 |