18520023. ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME simplified abstract (Samsung Electronics Co., Ltd.)
Contents
- 1 ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME
Organization Name
Inventor(s)
ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME - A simplified explanation of the abstract
This abstract first appeared for US patent application 18520023 titled 'ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME
Simplified Explanation
The patent application describes an electronic device with two processors operating in different environments, each with its own memory allocation. The second processor encrypts secure data from a trusted application and stores it in shared memory, along with encryption information, while the first processor stores the encrypted data in its memory.
- Two processors: The device has a first processor in a non-secure environment and a second processor in a secure environment.
- Separate memories: The first memory is allocated to the non-secure environment, the second memory to the secure environment, and the third memory is shared between the two.
- Encryption process: The second processor encrypts secure data from a trusted application, storing the encrypted data and encryption information in the shared memory.
- Storage: The first processor stores the encrypted data from the shared memory in its own memory.
Potential Applications
This technology could be applied in secure communication devices, financial transactions, and data storage systems.
Problems Solved
This technology helps protect sensitive information from unauthorized access and ensures secure data transmission between different environments.
Benefits
The benefits of this technology include enhanced data security, protection of sensitive information, and secure execution of trusted applications.
Potential Commercial Applications
Potential commercial applications of this technology include secure mobile devices, encrypted communication systems, and secure cloud storage solutions.
Possible Prior Art
One possible prior art for this technology could be secure data encryption methods used in banking systems or military communication devices.
Unanswered Questions
How does the device handle decryption of the encrypted data?
The patent application does not provide details on the decryption process of the encrypted data. This aspect would be crucial in understanding the full functionality of the device.
What encryption algorithms are used in the secure environment?
The patent application does not specify the encryption algorithms employed by the second processor in the secure environment. Knowing the encryption methods used could provide insights into the level of security offered by the device.
Original Abstract Submitted
An electronic device comprises: a first processor operating in a general non-secure environment; a second processor operating in a secure environment; a first memory allocated to the general non-secure environment; a second memory allocated to the secure environment; and a third memory shared in the general non-secure environment and the secure environment, wherein the second processor is configured to: encrypt at least a portion of secure data to generate an encrypted portion, the secure data generated by a trusted application executed in the secure environment, store the encrypted portion in the third memory, and store first information used to encrypt the at least a portion of the secure data and second information generated while encrypting the at least the portion of the secure data in the second memory, and wherein the first processor is configured to, store the encrypted portion stored in the third memory in the first memory.