Samsung electronics co., ltd. (20240356924). ELECTRONIC DEVICE FOR OPERATING SECURITY DEVICE, AND OPERATING METHOD THEREOF simplified abstract

From WikiPatents
Revision as of 06:00, 25 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

ELECTRONIC DEVICE FOR OPERATING SECURITY DEVICE, AND OPERATING METHOD THEREOF

Organization Name

samsung electronics co., ltd.

Inventor(s)

Donghyun Cho of Suwon-si (KR)

Yongje Lee of Suwon-si (KR)

Yungyu Gim of Suwon-si (KR)

Eunsang Jang of Suwon-si (KR)

Seungjoo Na of Suwon-si (KR)

Rakyoung Yoon of Suwon-si (KR)

Inchul Hwang of Suwon-si (KR)

ELECTRONIC DEVICE FOR OPERATING SECURITY DEVICE, AND OPERATING METHOD THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240356924 titled 'ELECTRONIC DEVICE FOR OPERATING SECURITY DEVICE, AND OPERATING METHOD THEREOF

The abstract describes an apparatus and method for operating a security device in an electronic device. The device includes an application processor, a communication processor, a security subsystem, an authority assignment device, and a processor key management device.

  • The security subsystem processes security functions.
  • The authority assignment device assigns authority to access the security subsystem to the application processor or communication processor.
  • The processor key management device provides keys related to the processors for accessing the security subsystem.
  • The security subsystem uses the keys provided to process security functions for the respective processors.
  • Data related to the processors is initialized based on the authority assigned by the authority assignment device.

Potential Applications: - This technology can be used in smartphones, tablets, and other electronic devices to enhance security measures. - It can be implemented in IoT devices to secure communication and data transfer. - Companies can integrate this technology into their systems to protect sensitive information and prevent unauthorized access.

Problems Solved: - Addresses the need for secure access to the security subsystem in electronic devices. - Ensures that only authorized processors can access and process security functions. - Enhances overall security measures in electronic devices.

Benefits: - Improved security for sensitive data and information. - Efficient management of processor access to the security subsystem. - Enhanced protection against cyber threats and unauthorized access.

Commercial Applications: Title: Enhanced Security Device for Electronic Devices This technology can be commercially applied in industries such as: - Information technology - Cybersecurity firms - Electronic device manufacturers

Questions about the technology: 1. How does this technology improve overall security measures in electronic devices? 2. What are the key benefits of using this security device in IoT systems?

Frequently Updated Research: Stay updated on the latest advancements in electronic device security and processor key management to ensure optimal protection against cyber threats.


Original Abstract Submitted

an apparatus and a method for operating a security device in an electronic device are provided. the electronic device includes an application processor, a communication processor, a security subsystem configured to process a security function, an authority assignment device configured to assign authority to access the security subsystem to the application processor or the communication processor, and a processor key management device configured to provide the security subsystem with a first key related to the application processor or a second key related to the communication processor assigned the authority to access the security subsystem from the authority assignment device, wherein the security subsystem is configured to process a security function related to the application processor or the communication processor by using the first key or the second key provided from the processor key management device, based on the authority assignment device assigning the authority to access the security subsystem to the application processor or the communication processor, and initialize data related to the application processor or the communication processor, based on returning the authority to access the security subsystem assigned to the application processor or the communication processor.