17866760. ELECTRONIC DEVICE AND OPERATING METHOD simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

ELECTRONIC DEVICE AND OPERATING METHOD

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

Hyungseok Yu of Suwon-si (KR)

Taeho Kim of Suwon-si (KR)

Jungmin Park of Suwon-si (KR)

Hyun Seo of Suwon-si (KR)

Shinjae Lee of Suwon-si (KR)

Kwangsik Choi of Suwon-si (KR)

Seyoung Choi of Suwon-si (KR)

Yurak Choe of Suwon-si (KR)

ELECTRONIC DEVICE AND OPERATING METHOD - A simplified explanation of the abstract

This abstract first appeared for US patent application 17866760 titled 'ELECTRONIC DEVICE AND OPERATING METHOD

Simplified Explanation

An electronic device is described in this patent application that includes a memory and at least one processor. The processor runs a user application with a certain permission level and an operating system with a higher permission level.

  • The device has a memory and at least one processor.
  • The processor runs a user application and an operating system.
  • The user application operates with a lower permission level.
  • The operating system operates with a higher permission level.

The patent application also describes instructions stored in the memory that, when executed, allow the processor to detect the operation of certain devices within the electronic device. This detection is done in an area with even higher permission level than the operating system.

  • Instructions are stored in the memory.
  • These instructions help the processor detect the operation of certain devices.
  • The detection is done in an area with higher permission level than the operating system.

Furthermore, the patent application explains that a notification is provided in a separate area, called the fourth area, indicating that the detected devices are being used with specified second devices. This fourth area is on a separate virtual machine, isolated from the other areas by a hypervisor executed in the third area.

  • A notification is provided in a separate area.
  • This area is called the fourth area.
  • The fourth area is on a separate virtual machine.
  • The fourth area is isolated from the other areas by a hypervisor.

Potential applications of this technology:

  • Enhancing security and privacy in electronic devices.
  • Enabling isolated execution environments for different applications.
  • Facilitating the detection and monitoring of device operations.

Problems solved by this technology:

  • Ensuring that different applications and operating systems operate with appropriate permission levels.
  • Providing a secure and isolated environment for device detection and monitoring.
  • Enabling efficient communication and notification between different areas of an electronic device.

Benefits of this technology:

  • Improved security and privacy for electronic devices and their users.
  • Enhanced control and management of device operations.
  • Flexibility in running different applications and operating systems with varying permission levels.


Original Abstract Submitted

An electronic device may include a memory and at least one processor operatively connected with the memory. The at least one processor, including processing circuitry, may run a user application in a first area operating with a first permission and run an operating system in a second area operating with a second permission higher than the first permission. The memory stores instructions configured to, when executed, cause the at least one processor to detect an operation of at least one first device included in the electronic device, in a third area operating with a third permission higher than the second permission, deliver a detection signal for the at least one first device to a fourth area, an execution environment of which is separated from the first area, the second area, and the third area, in the third area, and provide a notification that the at least one first device is operating using at least one specified second device, in the fourth area. The fourth area may be an area on a second virtual machine, an execution environment of which is separated from the first area and the second area being areas on a first virtual machine by a hypervisor executed in the third area.