18471814. ELECTRONIC DEVICE FOR CONTROLLING ACCESS TO DEVICE RESOURCE AND OPERATION METHOD THEREOF simplified abstract (Samsung Electronics Co., Ltd.)

From WikiPatents
Jump to navigation Jump to search

ELECTRONIC DEVICE FOR CONTROLLING ACCESS TO DEVICE RESOURCE AND OPERATION METHOD THEREOF

Organization Name

Samsung Electronics Co., Ltd.

Inventor(s)

Hyungseok Yu of Gyeonggi-do (KR)

David Scott Thomson of Mountain View CA (US)

Hayawardh Vijayakumar of Mountain View CA (US)

Michael Cabot Grace of Mountain View CA (US)

Robert Lee Harrison, Iii of Mountain View CA (US)

Taeho Kim of Gyeonggi-do (KR)

Shinjae Lee of Gyeonggi-do (KR)

Myungsu Cha of Gyeonggi-do (KR)

Kwangsik Choi of Gyeonggi-do (KR)

Seyoung Choi of Gyeonggi-do (KR)

ELECTRONIC DEVICE FOR CONTROLLING ACCESS TO DEVICE RESOURCE AND OPERATION METHOD THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 18471814 titled 'ELECTRONIC DEVICE FOR CONTROLLING ACCESS TO DEVICE RESOURCE AND OPERATION METHOD THEREOF

Simplified Explanation

The patent application describes an electronic device and its operation method. The device includes a memory and a processor. The processor executes an operating system in a first region, allowing operations based on a first authority. It also executes at least one application in a second region, allowing operations based on a second authority. The device receives a first authority policy from a server and obtains a second authority policy from the application. When the application accesses a device resource, the device configures the authority of access to the resource based on a third authority policy. This configuration is done using an authority determination module executed in a third region, allowing operations based on a third authority.

  • The patent application describes an electronic device and its operation method.
  • The device has a memory and a processor.
  • The processor executes an operating system in a first region, allowing operations based on a first authority.
  • The processor also executes at least one application in a second region, allowing operations based on a second authority.
  • The device receives a first authority policy from a server.
  • The device obtains a second authority policy from the application.
  • When the application accesses a device resource, the device configures the authority of access to the resource based on a third authority policy.
  • The configuration is done using an authority determination module executed in a third region, allowing operations based on a third authority.

Potential applications of this technology:

  • Secure access control systems for electronic devices.
  • Multi-level authorization systems for applications and resources.
  • Enhanced security measures for protecting sensitive data.

Problems solved by this technology:

  • Unauthorized access to device resources.
  • Ensuring proper authorization levels for different applications.
  • Protecting sensitive data from unauthorized access.

Benefits of this technology:

  • Improved security and access control for electronic devices.
  • Enhanced protection of sensitive data.
  • Efficient management of authorization policies for applications and resources.


Original Abstract Submitted

An electronic device, and an operation method thereof, are disclosed. The electronic device may include a memory; and a processor configured to execute at least one operating system executed in a first region allowing an operation based on a first authority; execute at least one application executed in a second region allowing an operation based on a second authority; receive a first authority policy from a server; obtain a second authority policy from the at least one application; and in response to detection of access to at least one device resource by the at least one application, configure authority of access to the at least one device resource, according to a third authority policy based on the first authority policy and the second authority policy, by using an authority determination module executed in a third region allowing an operation based on a third authority.