Samsung electronics co., ltd. (20240178990). ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME simplified abstract
Contents
- 1 ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does the device handle decryption of the encrypted data?
- 1.11 What measures are in place to prevent unauthorized access to the shared memory?
- 1.12 Original Abstract Submitted
ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME
Organization Name
Inventor(s)
ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240178990 titled 'ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME
Simplified Explanation
The patent application describes an electronic device with two processors operating in different environments, each with its own memory, as well as a shared memory. The second processor encrypts secure data from a trusted application and stores it in the shared memory, while storing encryption information in its own memory. The first processor then retrieves the encrypted data and stores it in its own memory.
- Two processors: The device has a first processor in a non-secure environment and a second processor in a secure environment.
- Separate memories: The first memory is allocated to the non-secure environment, the second memory to the secure environment, and the third memory is shared between the two.
- Encryption process: The second processor encrypts secure data from a trusted application, stores the encrypted data in the shared memory, and keeps encryption information in its own memory.
- Data storage: The first processor retrieves the encrypted data from the shared memory and stores it in the first memory.
Potential Applications
This technology could be used in secure communication devices, financial transactions, and data storage systems.
Problems Solved
This technology helps protect sensitive data from unauthorized access and ensures secure storage and transmission of information.
Benefits
The benefits of this technology include enhanced security, protection of confidential data, and secure communication channels.
Potential Commercial Applications
Potential commercial applications of this technology include secure mobile devices, encrypted messaging platforms, and secure cloud storage services.
Possible Prior Art
One possible prior art for this technology could be secure data encryption methods used in banking systems or military communication devices.
Unanswered Questions
How does the device handle decryption of the encrypted data?
The patent application does not provide details on the decryption process of the encrypted data. It would be important to understand how the device securely decrypts the data to access the original information.
The patent application does not mention specific security measures to prevent unauthorized access to the shared memory where the encrypted data is stored. It would be crucial to know what safeguards are in place to protect this sensitive information.
Original Abstract Submitted
an electronic device comprises: a first processor operating in a general non-secure environment; a second processor operating in a secure environment; a first memory allocated to the general non-secure environment; a second memory allocated to the secure environment; and a third memory shared in the general non-secure environment and the secure environment, wherein the second processor is configured to: encrypt at least a portion of secure data to generate an encrypted portion, the secure data generated by a trusted application executed in the secure environment, store the encrypted portion in the third memory, and store first information used to encrypt the at least a portion of the secure data and second information generated while encrypting the at least the portion of the secure data in the second memory, and wherein the first processor is configured to, store the encrypted portion stored in the third memory in the first memory.