PRIORITY-BASED APPLICATION EXECUTION METHOD AND APPARATUS OF DATA PROCESSING DEVICE
    1.
    发明申请
    PRIORITY-BASED APPLICATION EXECUTION METHOD AND APPARATUS OF DATA PROCESSING DEVICE 有权
    基于优先级的应用程序执行方法和数据处理设备的设备

    公开(公告)号:US20140165216A1

    公开(公告)日:2014-06-12

    申请号:US14097921

    申请日:2013-12-05

    CPC classification number: G06F21/629 G06F9/468 G06F9/4843 G06F21/74 G06F21/83

    Abstract: A method and an apparatus for executing applications in a highest-priority-first order in the processor divided into a secure mode area and a non-secure mode area are provided. The method includes receiving a request to be processed in the non-secure mode domain from the application, determining an access permission level configured to a resource used for processing the request, determining, when the access permission level allows for access from the secure mode domain, a priority of the application, changing the access permission level to allow for access by the non-secure mode domain according to the priority of the application, and processing the request of the application using the resource in the non-secure mode domain.

    Abstract translation: 提供了一种用于在被分为安全模式区域和非安全模式区域的处理器中以最高优先级顺序执行应用程序的方法和装置。 该方法包括从应用程序接收在非安全模式域中处理的请求,确定配置给用于处理请求的资源的访问权限级别,确定访问许可级别何时允许从安全模式域访问 ,应用的优先级,根据应用的优先级改变访问许可级别以允许非安全模式域的访问,以及使用非安全模式域中的资源来处理应用的请求。

    ELECTRONIC DEVICE FOR STORING SECURE DATA AND METHOD FOR OPERATING THE SAME

    公开(公告)号:US20240178990A1

    公开(公告)日:2024-05-30

    申请号:US18520023

    申请日:2023-11-27

    CPC classification number: H04L9/0637 G06F21/602 H04L9/0631

    Abstract: An electronic device comprises: a first processor operating in a general non-secure environment; a second processor operating in a secure environment; a first memory allocated to the general non-secure environment; a second memory allocated to the secure environment; and a third memory shared in the general non-secure environment and the secure environment, wherein the second processor is configured to: encrypt at least a portion of secure data to generate an encrypted portion, the secure data generated by a trusted application executed in the secure environment, store the encrypted portion in the third memory, and store first information used to encrypt the at least a portion of the secure data and second information generated while encrypting the at least the portion of the secure data in the second memory, and wherein the first processor is configured to, store the encrypted portion stored in the third memory in the first memory.

Patent Agency Ranking