ELECTRONIC DEVICE IDENTIFYING INTEGRITY OF IMAGE USING PLURALITY OF EXECUTION ENVIRONMENTS AND METHOD OF CONTROLLING THE SAME

    公开(公告)号:US20250086772A1

    公开(公告)日:2025-03-13

    申请号:US18956822

    申请日:2024-11-22

    Abstract: An electronic device includes at least one memory, a camera, and at least one processor, wherein the at least one processor is configured to: obtain raw image for an external object from the camera in a secure environment and store the obtained raw image in the at least one memory, to obtain first image from the raw image through first image processing and second image processing on the stored raw image in the secure environment, based on obtaining of a verification request from a normal environment: to obtain, in the secure environment, second image obtained from the raw image through the second image processing for the stored raw image in the normal environment, to obtain third image from the second image through the first image processing for the obtained second image in the secure environment, and to identify integrity of the second image based on the obtained first image and the obtained third image.

    ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME

    公开(公告)号:US20240178990A1

    公开(公告)日:2024-05-30

    申请号:US18520023

    申请日:2023-11-27

    CPC classification number: H04L9/0637 G06F21/602 H04L9/0631

    Abstract: An electronic device comprises: a first processor operating in a general non-secure environment; a second processor operating in a secure environment; a first memory allocated to the general non-secure environment; a second memory allocated to the secure environment; and a third memory shared in the general non-secure environment and the secure environment, wherein the second processor is configured to: encrypt at least a portion of secure data to generate an encrypted portion, the secure data generated by a trusted application executed in the secure environment, store the encrypted portion in the third memory, and store first information used to encrypt the at least a portion of the secure data and second information generated while encrypting the at least the portion of the secure data in the second memory, and wherein the first processor is configured to, store the encrypted portion stored in the third memory in the first memory.

Patent Agency Ranking