Samsung electronics co., ltd. (20240178990). ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME simplified abstract

From WikiPatents
Jump to navigation Jump to search

ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME

Organization Name

samsung electronics co., ltd.

Inventor(s)

Jinha Hwang of Suwon-si (KR)

Inho Kim of Suwon-si (KR)

Dongsun Lee of Suwon-si (KR)

Jaemin Ryu of Suwon-si (KR)

Kyungim Jung of Suwon-si (KR)

ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240178990 titled 'ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME

Simplified Explanation

The patent application describes an electronic device with two processors operating in different environments, each with its own memory, as well as a shared memory. The second processor encrypts secure data from a trusted application and stores it in the shared memory, while storing encryption information in its own memory. The first processor then retrieves the encrypted data and stores it in its own memory.

  • Two processors: The device has a first processor in a non-secure environment and a second processor in a secure environment.
  • Separate memories: The first memory is allocated to the non-secure environment, the second memory to the secure environment, and the third memory is shared between the two.
  • Encryption process: The second processor encrypts secure data from a trusted application, stores the encrypted data in the shared memory, and keeps encryption information in its own memory.
  • Data storage: The first processor retrieves the encrypted data from the shared memory and stores it in the first memory.

Potential Applications

This technology could be used in secure communication devices, financial transactions, and data storage systems.

Problems Solved

This technology helps protect sensitive data from unauthorized access and ensures secure storage and transmission of information.

Benefits

The benefits of this technology include enhanced security, protection of confidential data, and secure communication channels.

Potential Commercial Applications

Potential commercial applications of this technology include secure mobile devices, encrypted messaging platforms, and secure cloud storage services.

Possible Prior Art

One possible prior art for this technology could be secure data encryption methods used in banking systems or military communication devices.

Unanswered Questions

How does the device handle decryption of the encrypted data?

The patent application does not provide details on the decryption process of the encrypted data. It would be important to understand how the device securely decrypts the data to access the original information.

What measures are in place to prevent unauthorized access to the shared memory?

The patent application does not mention specific security measures to prevent unauthorized access to the shared memory where the encrypted data is stored. It would be crucial to know what safeguards are in place to protect this sensitive information.


Original Abstract Submitted

an electronic device comprises: a first processor operating in a general non-secure environment; a second processor operating in a secure environment; a first memory allocated to the general non-secure environment; a second memory allocated to the secure environment; and a third memory shared in the general non-secure environment and the secure environment, wherein the second processor is configured to: encrypt at least a portion of secure data to generate an encrypted portion, the secure data generated by a trusted application executed in the secure environment, store the encrypted portion in the third memory, and store first information used to encrypt the at least a portion of the secure data and second information generated while encrypting the at least the portion of the secure data in the second memory, and wherein the first processor is configured to, store the encrypted portion stored in the third memory in the first memory.